P.O. Box 85518
Lincoln, NE 68501-5518
CHANGE SERVICE REQUESTED
September 26, 2008
Volume 30 Number 39
www.processor.com
Products, News & Information Data Centers Can Trust. Since 1979
Which Mobile
Device Is Right?
Keep Employee Roles &
Business Needs In Mind
by Elizabeth Millard
• • •
The market is awash in mobile
devices, from the latest generation of
the iPhone to feature-rich laptops
that can practically do the dishes and
walk the dog.
But just because devices are popu-
lar, pretty, and loaded with options
doesn't mean they're right for every
employee. Experts note that when it
comes to making choices on who
will carry which device, the decision
often has to be made at the employee
level after a survey of their prefer-
ences, job roles, and needs.
An administrative assistant won't
need the same type of device as an
on-the-go salesperson, and even a
CEO and a CEO might require dif-
ferent devices. When surveying employees
to determine the best fit, there are several
main factors that come into play.
Software Use
The largest consideration in choosing a
mobile device centers on how it will be
used, notes Andy Ballema, CDW mobility
specialist (www.cdw.com).
"Companies must understand the com-
puting functions each employee relies on
in order to be successful in their posi-
tion," he says. Eor example, an employee
who needs regular access to spreadsheets
and word processing documents might
require a different device than one who
only accesses email and calendar func-
tions.
In addition to what types of software are
currently in use, employees should be sur-
veyed about what they'd like to have.
Mobile applications are being created that
Go to Page 10
Leasing Equipment
What SMEs Should Look
For Before They Lease
by Sixto Ortiz Jr.
In the ever-changing world of modern
computing, only one thing is certain:
Companies must frequently invest money
in new technologies. The reasons for
investing in technology are legion, from
business growth to customer demands to
the need to keep pace with new technolo-
gy and competitors that are surely invest-
ing in it. And of course, management
expects all these investments to be surefire
bets that deliver maximum bang for the
buck, purchased with static or even
shrinking budget dollars.
That said, enterprises considering invest-
ing in new equipment should consider leas-
ing. After all, a set cost and a more estab-
lished upgrade cycle are two significant
advantages leasing provides. However,
administrators should also be aware of the
disadvantages that come with leasing
equipment and have plans in place to mini-
mize them.
The Leasing Advantage
At the heart of leasing 's advantages lies
the guarantee that technology "refreshes"
A set cost and a more established
upgrade cycle are two significant advantages
leasing provides.
will occur with consistency. Ed Lucente,
manager of financial services and partners
at Verari Systems (www.verari.com), says
leasing can provide better IT life cycle
management and significantly reduce the
equipment's total cost of ownership
because leasing can generate lower IT
support costs and lower maintenance
costs associated with the deployment of
current technology and the most energy-
efficient assets.
"A key ingredient of a well-structured
leasing plan includes, for example, periodic
technology refreshes so that customers
remain current with technology and as
competitive as possible in their industry,"
says Lucente.
David Cantliffe, president and founder of
BottomLine Advantage (www.bottomline
adv.com), a client advocacy consulting
group, says the question of leasing vs. pur-
chasing is often answered by the financial
situation of a business.
Go to Page 10
n This
ISSUE
COVER FOCUS
Helping Your Remote Employee
What tools do your traveling or remote employ-
ees need? How can you help solve some of the
most common problems they'll face? We talked
with experts to find out.
Which Mobile Device Is Right? 1
Here Comes The iPhone 9
Mobile Woes 11
Access Anxiety 12
TECH & TRENDS
Equipment Leasing 1 1
A set cost and a more established upgrade cycle
are two significant advantages leasing provides.
However, administrators should also be aware of
the disadvantages that come with leasing equip-
ment and have plans in place to minimize them.
Extending The Data Center Life Cycle | 23
Nobody has been promised a fat, carefree bud-
get for the rest of 2008. That means data center
managers must look for ways they can extend
the life cycle of their current data centers.
Avoiding Vista? | 24
Many analysts thought that the reason Vista had
yet to take off was because most IT departments
were waiting for SP1 to banish any bugs or securi-
ty weaknesses typical in the first iteration of any
new operating system. But is that really the case?
High-Density, High Cooling | 25
The latest hardware has certainly made it much
easier to pack a lot more horsepower in a small-
er package, but more power means more heat.
Product Releases 1 17
■ Citrix XenServer 5, the latest in a line of server
virtualization products, is now available from
Citrix Systems. ■ A new line-interactive UPS
from Eaton is targeted toward IT assets such as
switches, routers, servers, VoIP devices, and
workstations. ■ GSX launched the GSX Monitor
V9, a new version of its server monitoring and
reporting solution. ■ New from iStor Networks
are lOGbps and IGbps Ethernet iSCSI storage
products with the integraSuite/MC Management
Center. ■ porttracker announced porttracker
v2.0, its new network management appliance
that allows network managers to track and report
on devices currently or previously connected to
their networks. ■ Proginet released Slingshot
Vault, its solution to manage the space, security,
and bandwidth challenges associated with email
attachments. ■ Staco Energy Products re-
leased its UniStar P series single-phase online
UPSes in tower designs. ■ Unisys released
new software for the Unisys Infrastructure Man-
agement Suite.
EACH WEEK
Upcoming IT Events 4 Product Releases 17
Marketplace News 4 Six Quick Tips 26
Products At Work 5 What's Happening 27
Product Of The Week ..16 Three Questions 27
The Processor.com home page is updated each week with
new articles and hardware news to help you keep current.
Visit www.processor.com today.
Page 2
Processor.com
September 26, 2008
Subscribe Today/Address Change Form -iTel^nl^^^^
PLEASE PRINT
Phone: ( ) Fax: ( )
Contact Name:
© Copyright 2008 Sandhills Publishing Company.
All rights reserved.
Company Name:
Auuress.
City: State: Postal Code:
Country:
Email: Web Address:
Subscriptions: (800) 819-9014
Subscriptions Local: (402) 479-2132
Subscriptions Fax: (402) 479-2193
Mail Form To:
1 . What is the size of your company 3. What is your annual computer hardware/
(how many employees)? software purchasing budget?
□ Less than 10 □ 200 to 499 □ $0 to $9,999 □ $100,000 to $249,999
□ 10 to 99 □ 500 to 999 □ $10,000 to $24,999 □ $250,000 to $499,999
□ 100 to 199 □ 1,000+ □ $25,000 to $49,999 □ $500,000 to $999,000
1 — 1 <ic;n nnn +r\ <^oo ooo i — i <ii nnn nnn i
U v>OU,UUU TO v>yy,yyv U v> l,UUU,UUU+
2. How often do you purchase computer
hardware/software?
□ Weekly □ Quarterly
□ Bi-weekly □ Annually
□ Monthly □ No Involvement
P.O. Box 85518, Lincoln, NE 68501-5518
Overnight Delivery:
120 West Harvest Drive, Lincoln, NE 68521
www.Processor.com
Networking & VPN
September 26, 2008
Shavilk NetChk Protect 6.5 is an easy-to-use
security management tool that can keep your
assets, both physical and virtual, up-to-date
with the latest patches and security fixes.
$5,200 for 100 seats
(800) 690-6911
www.shavlik.com
ShAvlik
Simply Secure.
Manage Your Resources With Ease
Shavlik NetChk Protect 6.5
Virtualization is a godsend for the enterprise.
Along with green IT practices, virtual computing
can reduce costs through greater efficiency and
energy savings. On the other hand, if your
organization relies on IT workers to manually
patch, secure, and maintain the network-
especially in the more complex environment of
a virtualized data center— your costs might be
rising rather than dropping.
Shavlik says that its NetChk Protect 6.5 en-
terprise security management tool is the first to
automatically roll out patches and eliminate
unwanted software from not only physical
systems and online virtual machines but also
from offline virtual machines, as well. The soft-
ware seeks out and discovers offline virtual
assets to ensure that they are kept up-to-date,
giving your company the ability to demonstrate
due care for regulatory compliance purposes.
NetChk Protect 6.5 operates with either an
agent-based or an agentless architecture,
according to your organization's needs. It auto-
matically identifies Windows applications and
operating systems, determines whether updates
are available, and rolls out necessary patches.
It can discover and fix security risks such as
malware and misconfigured systems, too, with
its Active Vulnerability Management capabilities.
Shavlik's software also offers flexible customiza-
tion through its Any Patch, Anywhere Technolo-
gy. A wizard-like editor lets you create custom
patches to meet your network's specific needs.
The result is faster, more effective security and
management of a mixed environment, all
through a single console with an easy-to-use
interface. With Shavlik's NetChk Protect 6.5,
your organization may begin to realize more of
the savings virtualization can offer.
Clients
September 26, 2008
Rugged Mobile Computing
Intermec CK3
Every enterprise seeks to lower expenses
and streamline business practices; for data
capture and communication applications,
Intermec has introduced the CK3 mobile
computer to facilitate these improvements.
Primarily intended for warehouse opera-
tions, the handheld CK3 incorporates a
number of features designed for highly
adaptable data, image capture, and secure
wireless capabilities. The CK3 includes ID
and 2D barcode scanning, which can be
accomplished either up close or far away,
regardless of the lighting situation. It can
also scan damaged or low-quality barcodes.
The CKS's wireless features include an
802.11a/b/g wireless LAN with CCX (Cisco
Compatible Extensions) certification and
support for VoIP and Bluetooth. Other fea-
tures include speech recognition, an option-
al RFID reader, and support for integration
with Intermec's PB42 receipt printer, PB50
label printer, and other mobile printers.
Intermec's TE 2000 and i Browse software
come packaged with the CK3, which oper-
ates on the Windows Mobile 6.1 platform.
TE 2000 uses terminal emulation and sup-
ports multiple host sessions, security, ses-
sion persistence, and a complete set of
data collection options. iBrowse is a data
collection browser that does the job yet lim-
its users to only preapproved Web sites.
With Intermec's SmartSystems technology,
users can streamline IT tasks and reduce
costs by installing software, configuring set-
tings, and remotely connecting to the net-
work. The CK3 also has several accessories
including docking stations, an attachable
handle, and an IP30 handheld RFID reader.
The Intermec CK3 is a rugged,
handheld mobile computer
designed for industrial-class
applications, data capture,
and communication.
$1,995
(800) 755-5505
www.intermec.coin
ermec
Networking & VPN
September 19, 2008
Virtual Server I/O
Easily Monitor & Manage
Witli Xsigo's VP780 I/O Director
There are a lot of disadvantages to
using multiple cards, cables, and switches
for server input and output. With each
additional device and connection, it
becomes harder and harder to manage
data, deploy applications, and utilize serv-
er resources. However, with Xsigo's
VP780 x2 I/O Director — the next genera-
tion of its virtual resource hardware and
software architecture — you can use virtual
30 ^ ^ o <*a ^ Oi'Sl
V
resources in place of physical cards and
unified fabric to replace multiple cables.
The VP780 x2 I/O Director delivers
20Gbps of bandwidth to each server and lets
users monitor and control their I/O topology
in real time from a single view that extends
from the virtual machines to the physical
switch ports. The new I/O Director lets you
access traffic statistics from third-party tools
for enhanced performance monitoring.
Improved SAN and iSCSI boot capabilities
allow users to boot any server from any
Fibre Channel or iSCSI LUN for quick redi-
rection of server resources. The VP780 x2
I/O Director also includes role-based access
control to maintain existing lines of man-
agement demarcation.
By replacing fixed resources with con-
veniently managed virtual resources, IT
staff can move connectivity from one serv-
er to another within about 30 seconds
without requiring any recabling. The Xsigo
VP780 x2 offers scalable storage and net-
work connectivity, and its high-speed,
low-latency, hardware-based design lets
you maintain I/O identities, even though an
I/O migration. The Xsigo VP780 x2 I/O
Director is a 4U-high unit that will interop-
erate with your existing servers, storage,
and networking equipment.
Xsigo Systems VP780 x2 I/O Director
Starts at $30,000
Virtual resource hardware and software architecture
that lets you monitor and manage your server I/O topol-
ogy in real time from a single view
(408) 329-5600
www.xsigo.com
xsiqo
systems
September 26, 2008
Processor.com
Page 3
1 Security
September 26, 2008
1 Networking & VPN ^^^^^H
September 19, 2008
Difectory . Onyit
B 1 imtoy.HiMlB.ani ^
aiC>tni$*'.^ MSuifHKJS
GutlL«
WW
S H«:r™lt WTntewi 5«mr 5M5. IiMmi-
e>id He
« **VI
I4t«a Dnwwm tunn SiAmn
idTfiw ' StinnnM CompUMnn*
Embotics V-Scout is a
free tool for gathering
and managing
information from
VIVIware VirtualCenters
Free
(704) 770-6666
www.embotics.com
Simplified Management, Effective Oversight & VMware Reporting
Embotic's V-Scout
Time is of the essence, and rarely is it more
so tlian for IT and data center professionals
who have workers depending on them.
Embotics offers V-Scout as a solution to the
problem of time spent collecting and collating
information from VMs. V-Scout is free, agent-
less, and can start working for you minutes
after you download it.
V-Scout is designed to save users the time
spent gathering, formatting, updating, and
reporting on VMs in VMware VirtualCenter-
enabled environments and provide adminis-
trators a single, centralized management
source. Without V-Scout managing the infor-
mation from multiple VirtualCenters requires
manual effort; limited filtering, searching, and
reporting can be tedious; and it can be difficult
to track custom VM information.
Features of V-Scout include aggregation of
data from up to two VMware VirtualCenters,
online and offline VM discovery, automatic
VM tracking, up to 10 custom attributes, and
an unlimited number of reports. Types of
reporting include VM population trending
reports, guest OS inventory reports, host
inventory reports, managed system inventory
reports, VM inventory reports, and virtual
infrastructure summary reports.
Reports offer information such as historical
growth, costs, trend protection, the number of
running and total VMs, and templates for each
type of guest OS in table form. Other provided
information includes sums and averages for
host inventory and each VirtualCenter being
managed, detailed inventory information for a
VM, and summaries of information by Virtual
Infrastructure versions in table form.
Ideally, V-Scout helps companies assess virtual-
ization deployments and gain control over their
infrastructure. Further, V-Scout is designed to
help companies prevent virtual sprawl by provid-
ing centralized management options.
^ embotics
K ntyte gjj ^ ^ Ife M
r
mm F
1isiiiqi:iiq:o:
ingiBBiB I B
11
IS BQISSB-III
I-i
■DOBOriilll
Global DataCenter
Management nlyte® 5.0 helps you
visualize, monitor, optimize, and
model complex data center
environments
(866)949-GDCM (866-949-4326)
www.nlyte.com
Drive Down Data Center Costs
Global DataCenter Management nlyte® 5.0
Data Center operating budgets have been hit
hard as energy costs continue to rise. The
complexity of the data center and the interrela-
tionships between the assets and the applica-
tions they serve demands a management
solution that understands the current state of
the environment and provides the ability to
plan and model for future needs.
Built by data center professionals for data cen-
ter professionals, the nlyte® suite from GDCM
(Global DataCenter Management) optimizes
data center assets by visualizing, monitoring,
and modeling current and planned changes to
this critical infrastructure. The software pro-
vides immediate feedback on planned and im-
plemented changes to facilities, racks, servers,
cabling, power connections, and other assets
and resources. With a few clicks, nlyte can sup-
ply users with the data they need to identify im-
portant trends or analyze how planned
changes will impact redundancy power, cool-
ing, space, network, and cable capacity
The nlyte suite's auto-allocation capability re-
moves the guesswork of finding the best rack
for new server placement and, in many cases,
can recover unused rack capacity, delaying or
eliminating the need to expand the existing fa-
cility. The nlyte workflow module can help es-
tablish standard policies and procedures for
data center operations, reducing implementa-
tion time and eliminating costly mistakes.
Companies using nlyte are seeing significant
reductions in costs related to power, space,
and human capital, with an ROI of less than
12 months depending on installation's size.
J: GDCM*
Networking & VPN
Septemer 19, 2008
Networking & VPN
September 19, 2008
High-End Computing Goes Virtual
vSMP Foundation™ Aggregation Platform
For IT organizations that find high-end servers
too expensive and are fed up with the complexi-
ties of setting up and managing clusters, there is
a new innovative technology on the market that
can solve these user problems.
The innovative Versatile SMP™ (vSMP) architec-
ture from ScaleMP aggregates multiple industry-
standard x86 systems into a single virtual
system, delivering a high-end SMP computer.
The ScaleMP vSMP Foundation aggregation
platform creates virtual systems ranging from
four to 32 processors (128 cores) and up to 1TB
of shared RAM. It is optimized for compute- and
memory-intensive workloads, making it ideal for
the high-performance computing market. It pro-
vides a single virtual system across multiple
nodes of a cluster or blade server system, dra-
matically simplifying installation and ongoing
management. It delivers the operational simplicity
of traditional SMP systems while maintaining the
low acquisition costs associated with clusters.
The ScaleMP vSMP Foundation Standalone soft-
ware can be used to run extremely large jobs,
models, and simulations, even with a single
process; with up to 1TB of RAM, it fits most of the
large simulations in the industry By providing up to
128 cores of processing power, parallel applica-
tions significantly improve performance and run
time; they use different parallelization models such
as threaded, OpenMP, and MPI with the highest
performance.
vSMP Foundation Standalone is used in a range
of high-performance and technical computing
applications.
Aggregation
Virtual Machine
[
OS
VMM 1
Hvpervi»ror
VMM
VMM
VMM
Applications requiring SUp6rS6t
of the physical server resources
ScaleMP vSMP Foundation Standalone
aggregates multiple x86 systems into a single
virtual system
(877) MAX-VSMP (877-629-8767)
www.ScaleMP.com
Sca/eMff
Extend Your Copper
Network's Reach
Transition Networks IVIedia Converter Offers Solid Option
port on the MCM converts a Gigabit
Ethernet lOOOBase-T signal-, transmitting
over copper-, to a lOOOBase-SX signal-,
transmitting over fiber. Media
Conversion Modules are powered by
redundant power supplies. An optional
remote management module is also avail-
able to alert network managers of a power
supply failure or fan fault.
Whether using two modules in the lU
housing (24-port capacity) or up to eight
modules in the 4U housing (96-port
capacity), the MCM provides the highest
density media conversion solution avail-
able. Using the Media Converter Module
lets you reap all the benefits of installing
a modular MTP connector-based fiber
cabling system, while leveraging your
existing copper-based electronics.
Transition Networks
Plug & Play Universal Systems
Media Converter Module
Lets you take advantage of fiber-optic infrastructure
while using existing copper electronics
(800) 526-9267
www.transition.com
Are you looking to extend the reach of
an existing copper network? Trying to
alleviate copper cabling congestion?
Addressing EMI/RFI interference within
your data center?
The Plug & Play Universal Systems
Media Converter Module from Transition
Networks lets you gain all of the benefits
of a fiber-optic infrastructure and the
advantages of a preterminated, modular
solution, all while using the low-cost lega-
cy copper electronics currently available.
A jointly marketed venture between
two industry leaders — Transition Net-
works and Corning Cabling Systems
— the Plug & Play Universal Systems
MCM (Media Converter Module) is a
Gigabit Ethernet (lOOOBase-SX) media
conversion solution within a Plug & Play
Universal Systems. Each Media
Converter Module is configured with 12
modular RJ-45 ports on the front and two
MTP Connector ports on the back. Each
TRANSITION
NETWORKS i.
Page 4
Processor.com
Marketplace
NEWS
^ I SanDisk Rejects Takeover Bid
^ From Samsung
SanDisk has rejected a nearly $6
billion takeover offer from Samsung, claim-
ing that the $26-per-share offer undervalued
the company. SanDisk, maker of flash mem-
ory products, including USB memory drives
and digital audio players, may still be look-
ing at a hostile takeover from Samsung or a
competing bid from Toshiba, the world's
second largest maker of NAND memory
chips. Samsung, the world's largest maker of
NAND memory chips, reportedly now pays
SanDisk about $350 million a year to use its
patented technology. The company's $5.9
billion takeover offer reportedly represented
about a 70% premium over SanDisk' s recent
closing stock price.
I Senator Questions Text IVIessaging Rates
U.S. Senator Herb Kohl of Wisconsin
has launched an investigation into the rea-
son behind text messaging rate increases.
Kohl, head of the Senate Judiciary
Committee on Antitrust, Competition
Policy, and Consumer Rights, sent letters to
top executives at the four largest wireless
service providers. In the letters. Kohl points
out that consumers are paying more than 20
cents per text message today, up from 10
cents in 2005. The latest price increases,
according to Kohl, appear to have hap-
pened at about the same time, when the
number of U.S. wireless service providers
consolidated from six to four. Kohl says the
fact that providers are raising prices goes
against the "vigorous price competition we
hope to see in a competitive marketplace."
I Gartner Studies IT'S Green Efforts
A RECENT Gartner study has revealed that
most IT users are lacking the complete pic-
ture when it comes to environmentally
friendly technology and how best to pursue a
greener future. In its study, Gartner offers an
outline for the immediate, midterm, and
long-term issues to keep in mind. According
to the research firm, some of the immediate
green IT concerns should include looking
into advanced cooling technologies and use
of modeling and monitoring software. Some
midterm issues to focus on over the next two
to five years include green IT procurement,
videoconferencing, green legislation in data
centers, and corporate social responsibility
programs. Long-term goals should include
carbon offsetting and carbon trading, data
center heat recycling, alternative energy
sources, and green building design.
I Tech Groups IVlay IVIerge
Two TECH GROUPS that focus on tech lobby-
ing, policy advocacy, and business develop-
ment are in talks to merge. The ITAA
(Information Technology Association of
America) and the AeA (formerly known as
the American Electronics Association) want
to merge their memberships and programs to
provide "a stronger voice for the technology
industry," according to a statement. AeA and
ITAA members include industry leaders in
all segments of the technology industry;
members of a combined group would benefit
from greater efforts in terms of lobbying,
business and capital development, and
research, according to the groups.
I Apple Settles Backdating Suit
Apple CEO Steve Jobs and several other
Apple executives and board members have
settled a stock option backdating lawsuit
filed by shareholders. The suit, which was a
combination of 16 separate lawsuits
merged into one in 2006, alleged that
Apple officials falsified documents related
to several stock option grants. Because of
the unique nature of the lawsuit — share-
holders suing on the company's behalf —
the $14 million settlement will be paid to
Apple by insurers. The settlement requires
that Apple pay plaintiff attorney fees and
expenses, which amounted to more than $8
million. In addition, Apple's Board of
Directors must create new rules governing
stock options given to employees.
I Vangent Names Jim Reagan As CFO
Vangent, a global provider of consulting,
systems integration, human capital manage-
ment, and strategic business process out-
sourcing services, named Jim Reagan as its
new senior vice president and chief financial
officer. In this role, Reagan will lead
Vangent' s finance, contracting, pricing, and
Sarbanes-Oxley compliance activities. Prior
to this announcement, Reagan served as
executive vice president and CFO of Deltek.
While at Deltek, Reagan helped raise $162
million through the company's initial public
offering. He also worked to transform the
company into a Sarbox-compliant organiza-
tion. Some of Vangent' s clients include
Centers for Medicare & Medicaid Services;
the U.S. departments of Defense, Education,
Health and Human Services, and Labor; and
several Fortune 500 companies.
I Google Chrome Takes Share
After its second week, use of Google's
Chrome browser peaked at 0.85%, according
to Net Applications. Chrome's increase in
share comes at the expense of Microsoft' s
WATCH THE This information provides a quick glimpse of current and historical stock
1^^^^ J^l^ prices and trends for 14 major companies in the technology market.
Company
Symbol
Year Ago
Sept. 12$
Sept. 19$
% change from
previous week
AMD
AMD
$13.10
$5.75
$5.35
T 6.96%
Computer Associates
CA
$25.60
$21.70
$21.73
A 0.14%
Cisco Systems
CSCO
$32.09
$23.46
$24.01
A 2.34%
Dell
DELL
$27.74
$19.04
$17.04
T 10.5%
Google
GOOG
$546.85
$437.66
$446.11
A 1 .93%
HP
HPQ
$49.78
$46.97
$48.48
A 3.21%
IBM
IBM
$116.67
$118.97
$118.80
TO.14%
Intel
INTC
$25.68
$20.16
$19.25
T4.51%
McAfee
MFE
$35.09
$36.22
$37.66
A 3.98%
Microsoft
MSFT
$28.67
$27.62
$25.09
T9.16%
Oracle
ORCL
$20.84
$19.61
$20.10
A 2.5%
Red Hat Software
RHT
$19.90
$18.42
$18.32
T 0.54%
Sun Microsystems
JAVA
$5.81
$9.39
$8.50
T 9.48%
Symantec
SYMC
$19.58
$20.57
$19.87
T 3.4%
NOTE: This information is meant for reference only and should not be used as a basis for buy/sell decisions.
Internet Explorer, Mozilla Firefox, and
Opera; each has watched its market share
drop in the past 14 days. Apple's Safari
browser is the only browser unaffected
by Chrome's release; its share increased
by 0.7%. As Chrome and Safari continue to
square off, some sources say that Safari
might borrow some of Chromes features,
even though Chrome currently draws on
multiple aspects of Apple's WebKit engine.
I Social Networking Adoption Plans Lag
A STUDY COMMISSIONED by Avanade has
found that more than two-thirds of those sur-
veyed have no official plans to integrate
blogs, wikis, instant messaging, and other
social networking tools. More than 60% of
the senior executives and IT staff surveyed
indicated that management is resisting adop-
tion out of fear that the tools will sap worker
productivity. The survey also found that
many social media technologies have been
secretly worked into corporate environments,
but only 18% of companies have formal
plans for managing the use of social media.
I HP To Reduce Workforce
With its acquisition and integration of
EDS (Electronic Data Systems), HP
announced that it will be reducing its
workforce by about 24,600 employees
over the next three years. The reduction
makes up about 7.5% of all HP and EDS
employees, and about half will be from the
United States alone. HP CEO Mark Hurd
says that once the program is completed,
HP will be a bigger, stronger company and
will save about $1.8 billion. HP says it
will provide laid-off employees severance
packages that include counseling and job
placement services.
I Convicted Spammer Goes Free
The Virginia Supreme Court has struck
down an antispam law, ruling that the law
was unconstitutionally overbroad and that it
violated First Amendment rights to free
speech. The law, enacted in 2003, barred the
sending of anonymous emails related to pol-
itics and religion. The decision came in the
case of Jeremy Jaynes, who was convicted
as a felon under Virginia's antispam law in
2004. He sent between 10,000 and 12,000
unsolicited emails in a 24-hour period using
false transmission information. The court
subsequently overturned Jaynes' conviction.
I Nvidia Trims Its Workforce
On the heels of its successful Nvision 08
conference, graphics giant and chipset
manufacturer Nvidia announced plans to
lay off about 360 employees worldwide, or
roughly 6.5% of its personnel, by Oct. 26.
Severance packages, job placement assis-
tance, and counseling will lead to a $7 to
$10 million pretax charge against operat-
ing expenses in the company's third fiscal
quarter. Despite a high-performance prod-
uct lineup, Nvidia is facing tougher compe-
tition from rivals AMD and Intel and is
addressing packaging defects in some or
all of its recent graphics products.
I Oracle Reports Strong Revenue Growth
Oracle reported a first-quarter net
income of $1.1 billion, up 28% compared
to a year ago. Overall revenues were up
18% year-over-year to $5.3 billion. Sales
numbers were also positive, with software
revenues up 20% to $4.2 billion, new soft-
ware license revenues up 14% to $1.2 bil-
lion, license updates and software support
revenues up 23% to $2.9 billion, and rev-
enue from services up 9% to $1.2 billion.
Oracle President Charles Phillips says the
solid revenue growth shows that more and
more Oracle database customers are using
Oracle's integrated product suite to mod-
ernize their computing environments.
September 26, 2008
Upcoming 1 1 myiaiiiaJ
Are you looking to learn more about data center
or IT topics? Network with some of your peers?
Consider joining a group of data center
professionals. If you don't see a meeting listed in
your area, visit www.afcom.com, www.aitp.org,
or www.issa.org to find a chapter near you.
- SEPTEMBER -
AITP Akron
September 30, 6 p.m.
Lindsay's Amber Restaurant
1500 Canton Road
Akron, Ohio
www.akron-aitp.org/index.htm
- OCTOBER -
ITEC St. Louis
October 1-2
St. Louis, Mo.
www.goitec.com
AFCOM Central Texas
October 2, 11:30 a.m.
Marie Callender's Restaurant
9503 Research Blvd.
Austin, Texas
ISSA Mankato
October 2, 1 p.m.
Alltel Wireless
200 Technology Drive
Mankato, Minn.
www.katoinfosec.org
ISSA Central Plains
October 3, 1 p.m.
SKT Business Communications Solutions
3rd Floor
125 N. Emporia, Suite 100
Wichita, Kan.
www.issa-cp.org
Data Center World Fall 2008
October 5-8
Orlando, Fla.
www.datacenterworld.com
ITEC Ft. Lauderdale
October 7-8
Ft. Lauderdale, Fla.
www.goitec.com
AITP Central Idaho
October 8, 11:45 a.m.
The Owyhee Plaza
1109 Main SL
Boise, Idaho
www.boisestate.edu/dpma
/dpmaci/meetings.html
ISSA Baltimore
October 8, 4:30 p.m.
Sparta Inc.
7110 Samuel Morse Drive, Suite 200
Columbia, Md.
www.issa-balt.org
Detroit SecureWorld Expo
October 8-9
Detroit, Mich.
www.secureworldexpo.com
AITP Nashville
October 9, 5:30 p.m.
Holiday Inn-Brentwood
760 Old Hickory Road
Brentwood, Tenn.
www.aitpnashville.org
AITP Washington, D.C.
October 9, 6:30 p.m.
Alfio's Restaurant
4515 Willard Ave
Chevy Chase, Md.
aitpwashdc.ning.com
Gartner Symposium/ITxpo
October 12-17
Orlando, Fla.
www.gartner.com/it/sym/2008/sym1 8/sym1 8.jsp
Do you have a new product that data center/IT
managers would be interested in learning about?
Call (800) 544-1264 or email press@processor.com.
Subscriptions
(800) 819-9014
(402) 479-2170
Advertising & Reprints
(800) 247-4880
(402) 479-2141
FAX: (402) 479-2193
Editorial Staff
131 W. Grand Drive • Lincoln, NE 68521
editor@processor.com
FAX: (402) 479-2104
September 26, 2008
Processor.com
B8B^ T WORK
Products
Page 5
Campus Security
Ql Labs' QRadar Helps Wayne State
Keep Its Network Secure
by Robyn Wei smart
Like other large universities, Wayne
State University, a Detroit-based institution
of over 30,000 students, faces security
complications that the average enterprise
can sidestep.
"We are required to keep an open net-
work to [allow for the] free flow of infor-
mation. We cannot block certain things
because it would hinder student as well as
administration connections," says Gray don
Huffman, senior systems security specialist
at Wayne State (www.wayne.edu). "For
example, we would like to block IRC traf-
fic, and most corporate organizations don't
need IRC, but in a university environment,
IRC traffic is in some cases essential to
some research development."
But this sort of openness leaves the uni-
versity's network with a vulnerability that
enables bot-control networks to take advan-
tage of it and communicate with zombie
computers, among other things, says
Huffman.
Meanwhile, like any organization in this
economy, Wayne State is dealing with lim-
ited resources. "Most budgets today are
going to remain flat, so given the chal-
lenges security officers continue to face,
you're looking for products that can pro-
vide your limited staff with powerful tools
to assist in doing your job," says Morris
Reynolds, director of information security
at Wayne State.
Despite these circumstances, both
Reynolds and Huffman have found an
effective means of centralizing and monitor-
ing the security of the university's network:
Ql Labs QRadar (www.qllabs.com). Both
agree that their choice was the right one.
"Definitely I would say anyone in the secu-
rity field should be using it," Huffman says.
Campus Security Drivers
According to Reynolds, the primary
security drivers leading to Wayne State's
implementation of QRadar were trying to
determine how the university could best
manage the wide variety of responsibilities
it has in monitoring traffic activity and
keeping an eye out for suspicious activities
across the institution's network, especially
given its limited budget.
Huffman concurs: "We needed
a package that allowed us to look
at all different types of events
coming from any application we
had on campus, such as our fire-
walls, any domain controllers, and
our authentication servers, and
correlate these events so that if
something happened to one de-
vice and it was seen again on another
device, a flag would be issued."
In addition, Huffman and Reynolds also
needed a solution that could centralize the
traffic going across the network and help
them prioritize the order in which events
needed to be addressed and notify staff of
the actions that would have to be taken.
The Whole Package
According to Huffman, Wayne State's net-
work security solution needed to offer both
Layer 7 (application-level) traffic analysis
and traffic correlation to events. "A lot of
products out there either have the traffic anal-
ysis but don't have the event correlation or
vice versa, but QRadar was the only product
that had the whole package," Huffman says.
Huffman says that QRadar' s ability to
notify IT of unique events rather than
requiring IT to slog through, say, 200 indi-
vidual packets of data was a boon. "In
looking at and maintaining months' worth
of data, QRadar significantly cuts down on
the amount of space you need to provide,"
Huffman says.
In addition to solving the aforementioned
security drivers, QRadar has given the uni-
versity a significantly broader view of activ-
ities throughout the network, something nei-
ther he nor Huffman had anticipated up
front, Reynolds says. "With the university
being as widespread as it is, our ability to
really incorporate or integrate all of the
event logs into our portfolio allows us to
review any sort of suspicious traffic and
look for patterns or signs of attack, some-
thing we did not have previously."
Moreover, QRadar also lets Reynolds and
Huffman know which network devices are
incorrectly configured. According to Huff-
man, QRadar performs a benchmark of its
network over the space of a month and will
notify IT if it discovers anything unusual.
"Let's say a system is not configured cor-
rectly, and it is trying to do a bunch of
ICMP traffic outbound onto the network.
QRadar will notify and let you know some-
thing weird is going on. You have a look
at it, and lo and behold, [you find out]
something that should have been shut off
wasn't," says Huffman.
Reasonable Price, Great Service
Huffman says that QRadar' s cost fell in
the middle of the price range for security
solutions of this nature. Additionally,
QRadar does not have the storage require-
ments that some seemingly less expensive
solutions have.
What's more, Huffman rates Ql Labs'
customer service and support as "second to
none," adding that he has never before
experienced the sort of customer service
that Ql has provided in support of QRadar.
"Any time I have an issue, I call them up,
and it's usually resolved within the hour,"
says Huffman. "Just in talking to their sup-
port staff, every single one of them is
extremely knowledgeable on the product,
which is very difficult to find these days."
For his part, Reynolds says that Ql's
flexible software and tech support has
allowed Wayne State's IT department to
react quickly to changing business require-
ments both from its side and from what he
and Huffman see out on the network.
Off You Go
Huffman says implementation of QRa-
dar was quick. "It was basically plug and
play — put the servers in [and] do a couple
of quick configurations on the setup,
where it asks you maybe 10 to 15 ques-
tions, reboot your server, and off you go.
The results are pretty much instanta-
neous," he says.
Between QRadar' s ease of use, excel-
lent service, and the results it provided
Wayne State's network, Huffman and
Reynolds were motivated to migrate from
a standalone deployment to a distributed
one in August. "We just started throw-
ing everything we could at [QRadar], and
we just saw the amount of usefulness
we were getting out of it, and we could
hardly wait to throw more stuff at it,
so we had to expand," Huff-
man says.
Huffman points out that
QRadar will not reduce the
amount of time you spend
doing your job. However,
QRadar will put an end to
having to root through a
whole bunch of logs, trying to
figure out what has been
occurring on the network and possibly
discovering that traffic you were examin-
ing was bona fide. QRadar also will mini-
mize time spent checking out false posi-
tives so that you no longer have to go
individually to each one of your systems
looking for bugs and then trying to make
heads or tails of it, says Huffman.
"And QRadar will allow you to see a lot
more of what' s going on [in] your network,
so the time that was spent looking at all
those events will now be spent taking care
of the actual problems that you have,"
Huffman says. tM
Ql's flexible software and tech support lets
Wayne State's IT department react quickly to
changing business requirements both from its
side and from out on the network.
Ql Labs
I QRadar
Provides users with an effective way to moni-
tor and secure network traffic and integrates
threat management, log management, and
compliance management over a wide range
of supported devices; can be used in single
or distributed deployments
"A lot of products out there either have the
traffic analysis but [not] the event correlation
or vice versa, but QRadar was the only prod-
uct that had the whole package," says Gray-
don Huffman, senior support and security
analyst at Wayne State University (www
.wayne.edu).
(781)250-5800
www.q1labs.com
Clients
September 19, 2008
A Touch Of The Future
Tyco Electronics Brings Touchscreen
Capabilities To High-Traffic Environments
Touchscreen technology is a powerful
way to aid in carrying out tasks. Tyco Elec-
tronics has introduced two products de-
signed to push the touchscreen envelope
further, making it more useful for business-
es and easier to use for consumers.
The Elo TouchSystems 1900L and 2200L
are high-resolution LCD touch monitors
with zero-bezel design and wide aspect
ratios, which enable the entire surface of the
monitors to be used for screen space.
The Elo TouchSystems screens employ
APR (Acoustic Pulse Recognition) tech-
nology, which works by recognizing the
sound of a stylus touching the screen and
reacting accordingly. Therefore, virtually
any stylus can be used to manipulate items
on the screens — a fingertip, a capped pen,
the edge of a credit card, and so on.
Designed to last a long time with mini-
mal maintenance, the screens feature zero-
drift performance so they don't ever need
to be recalibrated. The glass surface fea-
tures optimal optical quality, durability,
and stability and is designed for excellent
dragging capabilities. Designed for use in
high-traffic environments such as retail,
hospitality, and public places, the glass is
resistant to water, dust, and grease.
The screens also feature built-in, down-
ward-facing speakers that save space and
maintain the all-screen appearance. The
stand is adjustable and can be mounted on
a desktop or a wall. Other features include
integrated VGA and DVI ports, touch-
interface USB (APR) and serial jacks,
AC/DC power, and a headphone jack.
Other manipulation buttons are located on
the side of the devices to help prevent
unintentional user disruptions.
Tyco Electronics Elo TouchSystems
1900L&2200L
Zero-bezel, dirt- and grease-resistant toucliscreens
designed for durability and functionality in high-traffic
environments
(650) 361-4800
www.elotouch.com
Tyco Electronics
Our commitment. Your advantage.
Page 6
Processor.com
September 26, 2008
Networking & VPN
September 19, 2008
Networking & VPN
September 19, 2008
Extensive Virtual
Monitoring
up.time 5 Optimizes Performance, Capacity & Availability
up.time
5's enterprise-wide dashboards
let you centrally manage your entire infrastructure.
ViRTUALiZATiON HAS promised to help
companies maximize their infrastructure
investments while minimizing hardware
and labor costs. So far, companies are
saving on hardware, however more sav-
ings are available through better virtual
systems management.
uptime software's up.time 5 is enter-
prise systems management software
with virtual management and monitoring
that optimizes virtual performance,
capacity, and availability across all vir-
tual technologies (VMware, AIX
LPARs, Solaris Zones). With up.time 5,
you can easily plan, manage, and moni-
tor your virtual infrastructure.
Enterprise-wide dashboards let you
centrally manage an entire global
infrastructure across environments
(physical and virtual technologies), plat-
forms, applications, services, and data-
bases, up.time can be quickly deployed
as a standalone solution or integrated
with existing tools and frameworks in
the IT stack.
up.time provides IT managers with the
insight to more effectively manage their
distributed applications and global ser-
vices levels, as well as maximize enter-
prise-wide IT resources, up.time's cross
domain, cross datacenter, and role based
real-time dashboards provide system
administrators with the necessary tools to
better monitor the performance and avail-
ability of both their physical and virtual
environments from a single centralized
console, uptime software focuses on pro-
viding a unique client experience through
a flexible engagement approach.
uptime software's up.time 5
30-day risk-free trial available
Systems Management software for SMB and
Enterprise Companies
(416) 868-0152
www.uptimesoftware.com
t
v!^ up.times
Physical Infrastructure
September 19, 2008
Simulate Data Center
Cooling Performance
TileFlow Helps You Meet Cooling Challenges
rated tiles and other sources,
and airflow and temperature
map in the above-floor space.
With TileFlow, you no longer
need to go through the expen-
sive and tedious trial-and-
error process to improve cool-
ing. Data center managers,
engineering and architectural
firms, equipment manufactur-
ers, and consulting companies
can benefit from TileFlow.
With TileFlow you can:
• Design highly efficient data centers
• Prevent heat-related outages of comput-
er equipment in existing data centers
• Save on the initial and operating costs
of cooling units
• Streamline installation and commis-
sioning
• Make cost-effective investments in
purchasing cooling-related hardware
Innovative Research TileFlow
Uses computational fluid dynamics to model airflow
motion and temperature distribution inside data centers
(763)519-0105
www.tileflow.com
In this age of increasing server heat
loads, proper cooling of server racks is a
new challenge for data center managers.
The key to reliable cooling in a data center
is to meet the cooling air requirement of
each server rack and to ensure an accept-
able inlet temperature. There are many
cooling solutions available, and choosing
the right one that meets the practical and
budgetary restrictions is not always easy.
TileFlow software is designed to help
you in analyzing the cooling performance
of an existing data center, identifying the
causes of cooling problems and rectifying
them, studying failure scenarios, planning
for future upgrades, and designing cooling
systems for new data centers.
TileFlow gives the pressure distribution
under the floor, the airflow through perfo-
Innovative Research, Inc.
A Computational Fluid Dynamics Company
Regain Control
Of Virtualization
BMC Introduces New Comprehensive Management Tools
I
■■■■■III
I.
BMC Capacity Management eliminates guesswork by providing
assessment, prioritization, and capacity monitoring capabilities,
Without a comprehensive virtualiza-
tion management solution, enterprises
could face decreased revenue, dissatisfied
customers, and diminished reputation.
BMC Software released nine new virtu-
alization tools to help customers reach
performance goals and increase compli-
ance and visibility by addressing the key
issues caused by virtualization.
BMC Virtualization Capacity Manage-
ment and Planning Service helps organi-
zations get started, regardless of their
experience planning virtualization and
consolidation programs. Application
Performance and Analytics provides
thresholds to keep service levels consis-
tent. BMC Performance Man-
agement monitors virtual in-
frastructure and applications.
BMC BladeLogic Virtuali-
zation Module for Servers
increases security and boosts
licensing and regulatory com-
pliance. Customers have auto-
mated, closed-loop change
and configuration control over
their virtualized environment
with BMC BladeLogic Opera-
tions Management Suite.
Other new tools include
Capacity Management, Dis-
covery Solution, Run Book
Automation Platform, and Run Book
Automation VMware Adapter. Each of
the new virtualization tools works with
both virtual and physical environments to
increase simplicity while reducing costs.
BMC Software Virtualization Tools
Nine new compreliensive virtualization management
tools designed to combat problems and risks
associated with virtualization
(877) 945-6325
www.bmc.com
<bmc'oflware
stantly Search
Terabytes of Text
instantly Seareh
Terabytes <rfText_
♦ dozens of indexed, unindexed,
fielded data and full-text
search options (including
Unicode support for hundreds
of international languages)
♦ file parsers / converters for
hit-highlighted display of all
popular file types
♦ Spider supports static and
dynamic web data; highlights
hits while displaying links,
formatting and images intact
♦ API supports .NET, C++, Java,
databases, etc. New.NET
Spider API
^^The Smart Choic^tor
Text Retrieval® since 1991
♦ "Bottom line: dtSearch manages a terabyte of text in a single
index and returns results in less than a second" - InfoWorld
♦ "For combing through large amounts of data," dtSearch "leads the
market" - Network Computing
♦ dtSearch "covers all data sources ... powerful Web-based engines"
- eWEEK
♦ dtSearch "searches at blazing speeds" - Computer Reseller News
Test Center
See www.dtsearch.com for hundreds more reviews,
and hundreds of developer case studies
ct dtSearch for fully-functional evaluations
1-800-IT-FINDS • 301-263-0731 • www.dtsearch.com
(1^800-483-4637)
September 26, 2008
Processor.com
Page 7
Networking & VPN
September 12, 2008
Manage Critical
IT Issues From
One Console
Dorado Software's Redcell Network
Commander Automates Manual Configuration Tasks
Many of the important operations facing
IT administrators today can all be
addressed via Redcell Network Comman-
der's consolidated user interface.
Redcell Network Commander's configu-
ration management capabilities enable
administrators to automatically configure
and maintain their IT environments. They
Redcell Network Commander eliminates
inefficiencies and errors caused by manual
configuration.
can automate backup and restora-
tion, easily perform device config-
uration comparisons, and update
OS and firmware to hundreds of
devices at once, eliminating the
inefficiency and errors associated
with manual configuration. With
the easy-to-use graphical user interface,
administrators can perform all device con-
figuration tasks and track all changes.
Redcell Network Commander also has
change and compliance management fea-
tures, including both event and policy-
based detection, proactive configuration
scanning, and comprehensive compliance
reporting.
Redcell Network Commander is part of
the Redcell for Enterprise Suite, which
includes Redcell OpsCenter, a discovery,
inventory, and monitoring platform.
Redcell Network Commander
Free trial available at doradosoftware.com/trials.html
Automated change and configuration management
application built for sophisticated network environments
(916) 673-1100
www.doradosoftware.com
Dorado
SOFTWARE
Messaging & Telephony
September 5, 2008
Add Skype, Keep Your
Phone Infrastructure
VoSKY Exchange Pro Doesn't Need Skype Software,
Computers, Or Headsets
With Skype's cost savings, it only makes
sense to integrate Skype into your compa-
ny's IP-PBX. The VoSKY Exchange Pro
VISIP-EX is a gateway that features SIP
trunk ports to let you assimilate Skype into
your enterprise environment. Other than
fiscal savings through using Skype, users
a
also get to take advantage of all of Skype's
business features and services, such as
interactive voice response, automatic call
distribution, and call recording.
The Exchange Pro VISIP-EX gateway
adds up to 30 lines of Skype, and because
employees can make and receive phone
calls over the existing corporate PBX, IT
staff won't need to maintain Skype soft-
ware or specialized headsets. Telecom-
muters and traveling workers can also
use the free Skype client on a laptop
or smartphone to avoid the complexities
associated with remotely accessing
IP PBXs.
The VoSKY Exchange Pro VISIP-EX
also lets companies add Skype business
applications to the IP PBX. For instance,
you could set up a Skype-powered click-
to-call button on the Web site to improve
online sales and offer a more comprehen-
sive sales presence. The gateway also
transmits all inbound and outbound Skype
calls in the company's Call Detail
Records archive. Based on VoSKY' s
Linux platform, the Exchange Pro VISIP-
EX offers enterprise-grade performance
and scalability.
VoSKY Exchange Pro VISIP-EX
$7,500 for 18 ports or $12,000 for 30 ports
With the VoSKY gateway, users can make and receive
Skype calls from their regular office phones
(408) 731-3900
www.vosky.com
VoSKY*
Visit our Website at
www.hergo.com to learn
more about our products
An original
equipment manufacturer ^
since its inception in 1992,
Hergo remains THE trusted
source for technical
furniture.
ergo 888.222.7270 www.hergo.com
GSA Contract # - GS-29F-01 33G
56-01 55th Avenue, Maspeth, New York 11378
Page 8
Processor.com
September 26, 2008
Security
August 29, 2008
August 22, 2008
Data Center Design
Goes Virtual
Future Facilities' 6SigmaDC Data Center Design & Analysis
Suite Offers Virtual Facility Planning
6SigmaDC's 3D modeling helps data center designers test out ideas,
A GOOD DATA CENTER Starts with good
design; it must be planned and laid out in
such a way that heating, cabling, and
more are done from a power, space, and
cooling standpoint. Future Facilities'
6SigmaDC Design and Analysis soft-
ware suite offers tools that let you create
a 3D virtual facility to test out ideas.
Designers can create a VF (virtual facil-
ity) that essentially gives users a full
inventory of the room, including cabinets,
IT equipment, power systems, cooling
systems, and ventilation grilles. Users can
use the VF to help configure cabinets with
rack-mounted equipment, to configure the
facility or room, to act as a layout and
testing tool for room equip-
ment, and to show ongoing con-
figuration and facility manage-
ment so changes can be tested
before implementation.
Features include an easy-to-
use GUI; the ability to read
data from other design tools;
large libraries of IT and sup-
porting equipment such as
ACUs, PDUs, and cabinets;
and a complete view of the
inventory. The suite also offers
drag-and-drop capabilities to
aid in model construction and
can predict grille flows, equipment
resilience, ACU performance, cooling
features, and energy efficiency metrics.
Future Facilities 6SigmaDC
Design & Analysis v4
Data center design tool that lets users create a
virtual facility to test out configurations
(408) 436-7701
www.futurefacilities.com
ftif ure fmilities
Remote Backup
& Data Loss Prevention
Spearstone's DiskAgent Offers Enterprise-Class Backup
J J Chi*
«(' ssa iKiw 10.1)3
□ '^-iiitM. cinvni, m atHKt! viia>t i.^msii
^ nrinuh m mrnn i!i.«7
i \'. _i 5p«iaa-.
fnaiwmimlatd t13f tlS US
Ei4n<(i4tMlh<liv tm 1U« Hit
DiskAgent by Spearstone lets you create secure online backups.
Data is perhaps the most valuable com-
modity a company possesses, and being
able to recover it in the event of a disaster,
secure it from a malicious hacker attack,
or retrieve and protect it if a computer is
lost or stolen is of utmost importance.
DiskAgent SaaS (software as a service)
from Spearstone seeks to offer a solution
with remote backup and loss protection.
DiskAgent offers data storage and pro-
tection with an easy-to-use, scalable SaaS
offering. Features include continuous
online backup with centralized manage-
ment and constant access to data, and if
hardware is lost or stolen, users can
remotely erase data, effectively prevent-
ing thieves from accessing sensitive
files. DiskAgent lets IT admins track
and potentially recover any stolen
devices with its hardware re-
covery functionality.
By encrypting all backed
up data as it moves both to
and from the Amazon S3 and
EC2 environments, DiskAgent
meets security regulations and
lets admins enforce document
retention policies and grant or
restrict user access to remotely
backed up files.
The DiskAgent SaaS is an
easy-to-use package offering
remote backup options and data loss pro-
tection. Yet DiskAgent is designed as an
enterprise-level protection package that
individuals other than IT professionals
can implement and maintain and requires
no expensive infrastructure.
DiskAgent by Spearstone
Starts at $4.95 per month per device; volume
discounts available
SaaS (software as a service) that provides continuous
online backup and remote device wipe capabilities
(877) DSK-AGNT
(877) 375-2468
www.diskagent.com
e
DISKAGENT"
80 PLUS
|energysmP
ENERGY STAR
4.0 READY
ES ATX 12V(v.2.2)8cin Fan Series
Seasonic ES series connes with 300, 350, 400, and 500 Watts, featuring Active
PFC, Snnart and Silent Fan Control, 80% + efficiency and so nnuch nnore. All of
these contribute Seasonic ES PSUs to received certification of 80 PLUS® and
Energy Star 4.0 ready. In addition, all of Seasonic PSU has nnet the RoHS re-
quirement. To believe in energetic thinking, think Seasonic. To find out
nnore,visit http://www.seasonicusa.conn.
30py^ 350W
I Factor Series
4a0W'~6OOWi
Industrial 1 U/2U Series
USA Office
TEL: +1 626-969-9966
FAX: +1 626-969-9986
EMAIL: usa@seasonic.com
MALABS
TEL: +1 626-820-8988
FAX: +1 626-820-8188
EMAIL: sales.la@malabs.com
AS I
TEL: +1 510-226-8000
FAX: +1 510-226-8858
EMAIL: web_fr_sales@asipartner.com
Supercom
TEL: +1 800-949-4567
FAX: +1 604-276-0807
EMAIL: sales@supercom.ca
GREEN INNOVATION POWERS YOUR LIFE
SINCE 1975
September 26, 2008
Processor.com
Here Comes
The iPhone
How To Make Apple's iPhone
Work In Your Enterprise
by Christian Perry
• • •
Had Paul Revere been an IT manager
in today's enterprise world, perhaps he'd
be known for yelling, "The iPhones are
coming! The iPhones are coming!" After
all, Apple's innovative smartphone is
invading enterprises with impressive
swiftness, and employees are using the
device to compute and communicate —
regardless of whether company policy
allows use of the device.
"While the iPhone isn't perfect for every
business, it is definitely accelerating the
adoption of PDAs/smartphones that indi-
vidual employees are purchasing — even if
corporations and employers are not," says
James Bond, director of engineering for
Apptix (www.apptix.com). "The days of
the IT department enforcing only a single
PDA/smartphone standard have been
replaced with trying to keep up with the
demands of users."
Security First
In a perfect world, IT managers would be
aware of every device used by employees
in their organization. But reality paints a
strikingly different picture, and the iPhone
is the perfect example of that reality,
because employees are often using the
device regardless of company policies.
Rene Poot, international systems engineer
for NCP Engineering (www.ncp-e.com).
iPhone Update 101
As with other mobile devices, the success of
the iPhone relies heavily on IT's and the users'
abilities to keep it updated with the latest firm-
ware. According to James Bond, director of
engineering at Apptix (www.apptix.com), this
process can be performed by users simply by
connecting the iPhone to a USB cradle or ca-
ble and allowing ilunes to perform the update,
although he says he hopes to see Apple or a
third party soon provide the ability to centrally
track updates or even force or push updates
over the air.
Because updates are critical to the i Phone's se-
curity and general function, enterprises must
ensure that users are indeed updating. Dustin
Shafae', operations manager for Papercheck.com
says that if corporate
policy dictates that
employees can use
their own devices, IT
administrators
should be aware of
the security implica-
tions and educate
users on the poten- ^
tial dangers.
"The users need to
understand the im-
plications of what
damage can be done
and the responsibili-
ty required when ac-
ces sing/storing
information on their
phones just as they
do with company-
issued notebooks. I
believe an educated
user is very valuable.
Locking down or
limiting the user will often encourage cre-
ative people to find the means to circum-
vent the security solution that' s imposed on
them," Poot says.
IT managers need to understand what the
iPhones will be used for, where they will be
used, and how they will be used, Poot says,
in addition to the device's limitations and
manageability issues. A major concern with
the iPhone is its lack of entire-device
(www.papercheck.com) says that the process
isn't always smooth. He explains, "The updates
do require a lot of time. We have updated our
phones three times since we've gotten them.
Halfway through the update process, your PC will
prompt you to plug in your iPhone, even when it is
already connected. After unplugging and recon-
necting, the iPhone provides the message that
the update had been interrupted and that the soft-
ware needs to be reset."
Says Bond: "Just as with other PDA and smart-
phone devices, the asset management of cor-
porate-owned—and even employee-owned—
devices is a challenge. I am sure we will see
more tools available in the future to assist with
this that may or may not be iPhone-specific."
encryption, which can become a problem
when users store sensitive company infor-
mation in the device.
"What happens to a device when it's lost,
displaced, or stolen? If it's not returned,
what happens to the data that's stored on
the device? What about tools on the device
that allow for remote access to the corpo-
rate network via Telnet, VPN, email, or
VNC or RDP [Remote Desktop Protocol]
tools that are now also available for this
BUY AN
"iPhone
1 1
1
platform? This is just as applicable for any
mobile device, and so the IT security man-
ager can apply the same security policies,"
Poot says.
Thomas Ingham, co-founder and chief
technologist at Coalmarch Productions
(www.coalmarch.com), says a mistake peo-
ple are making is that they're considering
the iPhone as something other than a regu-
lar computer. "We take all the same pre-
cautions in securing our network with any
device that's going to be playing in our
sandbox on a daily basis. This means
strong security on your wireless network
that's probably already in place, supported
by a healthy respect for limiting the public
visibility of your critical business data,"
Ingham says.
Welcome To The Fold
Whether enterprises deploy iPhones as
enterprise-wide devices or allow employ-
ees to use iPhones at their discretion, the
iPhone has tools that help to simplify in-
tegration with the enterprise network.
Bond recommends using the iPhone Con-
figuration Utility to preconfigure settings
for VPN, Wi-Fi, and Exchange accounts
and then distribute the configure profiles
to end users.
"I also recommend configuring your
Exchange environment for auto-discovery.
Page 9
whereby users can connect to your server
by simply entering their email address and
password into the iPhone, [and] Active-
Sync will automatically discover the server
name, SSL settings, etc.," Bond says. For
enterprises deploying iPhones, he says that
to minimize support calls to IT, "I would
openly announce which features are and are
not enabled on the iPhone and its built-in
ActiveSync. For example. Notes and Tasks
are not synchronized to the iPhone over
ActiveSync."
Bond also recom-
mends instructing users
what to do and what
not to do when it comes
to configuring their
iPhones via iTunes. For
example, he says it's
easy to accidentally
"kill" calendar and con-
tact data on the iPhone
when trying to use Ap-
ple's MobileMe server
along with Exchange/
ActiveSync.
Dustin Shafae', oper-
ations manager at Pa-
percheck.com (www
^ .papercheck.com),
recommends tasking a
person or team with
configuring the email
feature on iPhones for
end users. "Although it
was relatively easy for
our younger users in
the Papercheck main
offices, an older user who is not familiar
with technology will have more difficulty
and take more time to complete the email
configuration. [Leaving the task to IT] will
save you time, frustration, and money,
since the employee activating his or her
phone would be doing so while on the
clock," Shafae' says.
Other Concerns
Regardless of the number of iPhones in
an organization, iPhone management can
be tricky due to the lack of a mature central
management system, Poot says, although
the Configuration Utility is a step in the
right direction. He adds that exploit vulner-
abilities in versions of Safari running on
iPhones can allow the theft of call records
or contacts by people who trick the phone's
user into opening a maliciously constructed
link. Further, he says, security patches from
Apple are slow.
Finally, for enterprises using Exchange,
Bond recommends enabling ActiveSync
on their Exchange systems for email, cal-
endar, and contact synchronization. If an
organization doesn't have Exchange
servers in-house but wants to provide
iPhone users with access to Exchange
email and collaboration services. Bond
suggests they look into hosted Exchange
services.
Servers
August 29, 2008
Flexible, Reliable Servers
Chieftec Smart & Bravo Work As Departmental Server, Workstation
Every Chieftec product is designed
with quality construction, flexibility, atten-
tion to detail, and reliability in mind. These
characteristics make our Smart and Bravo
Series server solutions strong candidates
for departmental servers and workstations.
Made from 1mm SECC steel, the Smart
and Bravo Series employ clean and round-
ed-edge manufacturing techniques. Front
and side panel locks are standard. Models
support micro- to extended- ATX mother-
boards, and a metal PCI card retention bar
simplifies adding or removing cards without
screws. Two USB 2.0 ports, one 1394 Fire
Wire port, and line in/out audio connectors
are on the front. Standard PSII or mini-
redundant power supplies are supported.
WH-OlAVH-02 Smart Series
• Up to nine front accessible 5.25-inch
drive bays include 3. 5 -inch drive carri-
ers; eight on the WH-01
• Cooling is performed by optional
120mm rear or optional top fan mounts
BA/BX/BH-01 Bravo Series
• SmartScrew and tool-free drive mounts
• The BA full tower has up to eight front
drive bays and eight 3. 5 -inch internal
bays; the BX and BH mid/mini-towers
support up to six front-accessible bays
and six internal drives
• Flexible cooling options
• Power the system with Chieftec' s A135
Series power supply
• Cable management options assure cool,
stable, reliable, and efficient system
operation
• Backplanes in a variety of SAT A, SAS,
or SCSI RAID/JBOD configurations
Bravo Series BA/BX/BH-01 B-B-B
Smart Series WH-01/02B-B-B
Server solutions that feature clean and rounded edges
in a variety of options and configurations
(510) 324-3888
www.chieftec.com
^CHIEFTEC
September 26, 2008
Employee
Preference Survey
Crafting an employee survey can be a boon
for IT when determining which mobile device
is right for a specific employee. Here are the
types of questions that can help narrow the
choices:
• What software applications do you use
every day?
• How often do you access email and calen-
dar programs from your laptop or phone?
• Do you prefer several devices— PDA,
laptop, and cell phone— or to have all
functionality within one device, such as
a BlackBerry or iPhone?
• What devices, such as laptops and smart-
phones, have you used in the past, and
what did you like and not like about them?
• When you travel for work, would you pre-
fer a ruggedized device that can withstand
harsh environmental conditions or is that
not important for the type of sites you visit?
Page 10
Processor.com
Mobile
Device Is Right?
Continued from Page 1
can play on a number of devices, including
the iPhone.
Mobile apps around customer relation-
ship management are growing fast, and
companies are integrating these more often
than in the past, notes Michele Pelino,
senior analyst at Forrester Research.
"You're starting to see companies tie
these mobile applications in the needs of a
particular function in a business," she says.
"So, there are particular apps that are in
vertical markets and might appeal to com-
panies that hadn't considered using mobile
devices before."
Travel Frequency & Personal Preference
Travel to work sites — such as salespeo-
ple who go to construction areas or rural
locations — may steer device selection
toward something that' s ruggedized.
Although there are a number of cases for
PDAs, smartphones, and laptops that
promise protection from drops and spills,
it' s usually preferable to select a device that
was built with rugged use in mind because
special manufacturing techniques are used
to reduce shock to interior components
such as hard drives.
Another factor to consider is the employ-
ees' personal preferences. But sometimes,
asking employees what they want to carry
can be a challenge. Early adopters might
want the newest, most cutting-edge device,
while those who are skittish about technol-
ogy could request a simple cell phone up-
grade. But getting employees' thoughts about
what they prefer is important because there
needs to be a level of comfort with a device
for it to be used properly.
For example, an executive who hates the
iPhone' s interface and touchscreen will be
less likely to use the device and might
"cheat" on the assigned device by introduc-
ing one that's more familiar, such as a
BlackBerry. This would introduce prob-
lems into the IT mix because of necessary
upgrades, security issues, and repairs.
Also, some users may prefer laptops over
smartphones or PDAs because they're able
I Getting employees' thoughts about what
they prefer is Important because there needs
to be a level of comfort with a device for It to
I be used properly.
to store more data and have greater func-
tionality. Creating a comprehensive em-
ployee survey not only allows IT managers
to track preference trends but also gives
insight on technology comfort levels. (See
the "Employee Preference Survey" sidebar
for more information.)
Interoperability, Cost & Security Controls
Some employees may appreciate using
just one device, such as a laptop, while oth-
ers prefer using several devices, such as an
iPhone, an additional cell phone, and a
notebook.
When choosing what can fill up employ-
ees' bags, IT should look closely at how
these devices will be able to play together,
believes Richard Rushing, CSO of Air-
Defense (www.airdefense.net). And often,
that means more than just whether software
can sync.
"Most devices have some levels of inter-
operability, but issues with coverage and
billing could come up more often than
issues about whether the devices can com-
municate," he says.
Cost is linked to interoperability because
supporting several types of devices can be
more costly than negotiating a single sup-
port contract.
No matter what type of software or de-
vice is chosen, security should be an impor-
tant consideration when locking down both
the device itself and the data that's con-
tained within it, adds Rushing.
"One thing to keep in mind is how easy it
would be for the device to be lost or
stolen," he says. "This could have a great
impact on security concerns and risks.
Simple things like boot-up passwords and
PIN and encryption can play a role, and
Leasing Equipment
Continued from Page 1
For example, he says, most enterprises
can earn a higher return on investment
within their business than a lease's or bank
loan's interest cost. Thus, many times it
makes sense for an enterprise to generate
more revenue by investing its cash rather
than spending it on equipment.
Avoiding Potential Pitfalls
BottomLine Advantage's Cantliffe says
a potential "gotcha" with leasing compa-
nies is a contract provision that lets a leas-
ing company change a lease payment if
equipment costs change. This provision,
he adds, is usually unnecessary and poten-
tially costly because equipment costs do
not change that frequently. Enterprises
should avoid signing leases that contain
this provision.
Leasing Checklist
Ed Lucente, manager of financial services at
Verari Systems (www.verari.com), recommends
considering the following checklist to help you
avoid pitfalls as you seek a leasing solution.
• Does the contract provide details about the
type of lease; the lease's expiration date; the
accepted payment procedures; deadlines for
cancellation, renewal, and contract change
notices; and the timeframe of the lease?
• Is the price of contract modification included
for early termination, return to lessor, exten-
sion of lease, purchase option at end of
lease, and/or upgrades?
• Is there a provision allowing each piece of
the lease to be treated as a separate item?
• Is there a provision allowing substitution of
like items for lost or damaged equipment at
end of lease?
• Is there a complete description of the proper-
ty to be leased?
• Are delivery times and dates specified?
• Are warranty period and conditions defined?
Another pitfall is what Tom Williams,
president and CEO of eLease.com, calls
"The End-of-Term Surprise." According
to Williams, leasing companies typically
offer four ways to close out a lease: pur-
chase of the equipment for a fixed amount,
purchase of the equipment at fair market
value, return of the equipment, or contin-
ued leasing of the equipment for a time
period.
Williams warns that many enterprises
sign leases without fully understanding
these closing options, guaranteeing them-
selves an unwanted surprise at the end of
the lease. SMEs should understand what
they will own and what they will owe at the
end of a lease before signing a contract.
Williams also recommends that enter-
prises be aware of potential state sales or
use taxes or even personal property tax
• Is acceptance criteria defined?
• Are insurance and business continuity re-
quirements defined?
• Has the provision of leaner equipment in
case of damage/repair been addressed?
• Is estimated residual value specified?
• Are end-of-lease notification requirements
clearly defined?
• Are packaging and shipping terms defined?
• Are maintenance and upgrade minimum
standards to be met by the company/division
defined?
• Are roles and responsibilities for support
agreements outlined for maintenance, down-
time, vendor management assistance, instal-
lation, and/or training?
• Are lessee rights clearly outlined?
• Is it clear how the company/division will en-
force the contract?
• Have the legal and financial departments
reviewed the contract?
• Has all legislation regarding the acquisition of
IT been met?
issues triggered by leases. Also, he adds,
businesses should choose their vendors and
equipment carefully. Because a leasing
contract is a three-way contract between a
business, the leasing company, and an
equipment vendor, the business is responsi-
ble for paying the lease regardless of the
effectiveness of the equipment.
Verari 's Lucente recommends that enter-
prises choose IT equipment lessors that
have financial strength; worldwide scope;
and contract, asset management, and
administrative flexibility. Leasing compa-
nies should also have flexible programs
(such as capacity-on-demand or short-term
leasing), IT portfolio expertise with a deep
understanding of IT life cycles and multiple
asset classes for project management, and
asset recovery services.
Insurance Blues
Another potential pitfall is the addition by
leasing companies of insurance coverage for
equipment if business insurance will not
cover the equipment, says eLease.com' s
Williams. Also, he adds, some leasing com-
panies will charge a fee for not having
insurance instead of adding the insurance
themselves. At the end of the day, says
Williams, enterprises should not assume
that insurance is provided by the leasing
company and should ask about it before
signing a contract.
Even SMEs that already have suitable
insurance coverage can run into a snag with
this. Cantliffe says an additional profit cen-
ter for leasing companies is add-on insur-
ance when the lessee has not provided
proof of insurance to the lessor.
"It is a real hassle to clear this up, so
make sure you get acknowledgement from
each of these dictate the type and amount
of security needed for mobile devices."
Some companies have taken the tactic of
allowing only preapproved devices in the
workplace and banning others that can
access the network. Although this might
work in theory. Rushing thinks it's unreal-
istic in practice.
"If you tell an employee he can't bring
and use his cell phone, he will likely just
keep it hidden," he says. "Allowing devices
to operate in your enterprise without any
rules or policies is truly the biggest risk."
the lessor of their receipt of your proof of
insurance," warns Cantliffe.
In fact, Cantliffe recommends that enter-
prises ask the equipment vendor to agree (in
writing, on the equipment order form) to
monitor the leasing company's acknowl-
edgement of a property insurance certificate.
He adds that enterprises can add language to
an equipment order form stating that if there
is a property insurance cost added to a lease
invoice after a property insurance certificate
has been supplied to the vendor, the vendor
will remove it from the lease invoice. In
short, he says, make the vendor responsible
for handling this potentially thorny issue.
When Not To Lease
Even though leasing can offer an enter-
prise considerable advantages, there are
times when leasing doesn't make sense.
Verari' s Lucente says in cases where the
projected productive or useful industry life
of the IT asset is longer than five years, it
makes more sense to purchase. Although,
he adds, a well-positioned lessor may be
able to offer an operating lease that is an
attractive alternative to purchasing the
equipment outright.
Also, there are times when purchasing is
perceived as being simpler than leasing.
This may occur in cases where a capital
budget exists for the acquisition, and a pur-
chase may appear to be the simpler transac-
tion. But, he adds, an IT lessor may be able
to demonstrate compelling advantages to
leasing, even under these circumstances.
Finally, says Lucente, there are those
times when a business has been burned by
a previous leasing experience that ended
badly. The best cure for this, he adds, is
selecting a trusted, world-class lessor.
Enterprises should choose IT equipment
lessors that have financial strength; worldwide
scope; and contract, asset management, and .
administrative flexibility. I
September 26, 2008
Processor.com
Mobile Woes
Solving Five Common
Mobile Phone Issues
by Chris A. MacKinnon
• • •
Data center help desks are getting an
increasing number of mobility-based calls
from enterprise users carrying smartphones
and cell phones while away from the office.
Why? Because the phones keep getting
smarter — so smart, in fact, that companies
are loading their employees with phones
that can help them do their jobs just about
anywhere. But better mobility does not
come without a troubleshooting price tag.
Here we look at the five most common
problems (and their respective solutions)
business users will encounter while using
their cell phones.
Catching Missed Calls
According to Mark Amszej, director of
channel product management at RIM
(Research In Motion; www.rim.com), one
administrative challenge for mobile work-
ers is keeping up with the backlog of
voicemail messages left while they were
out of the office. He says enterprises can
virtually eliminate this hassle while
improving the responsiveness of the work-
force by turning smartphones into mobile
extensions of desk phones. "This capabili-
ty requires back-end technology that
mobilizes the corporate phone system,"
Amszej notes. "With this capability,
mobile workers have one 'reach me any-
where' phone number that simultaneously
rings on both their desk phone and their
smartphone — no more missed calls and no
more voicemail backlogs."
Amszej says calls answered on a smart-
phone can be handled with standard func-
tionality available on desk phones, includ-
ing the ability to put a call on hold, transfer
to another extension, or connect to a con-
ference call.
Protecting Smartphone Content
In Amszej 's opinion, one of the primary
concerns of organizations with smartphone
Most Common Problem
Mark Amszej, director of channel product man-
agement at RIM (Research In Motion; www.rim
.com), says one of the most common issues
enterprise users run into with their cell phones
is battery problems.
One solution, according to Amszej, is using
replaceable batteries. "Workers who are away
deployments is protection of corporate
information. He says the first line of
defense for IT departments is to set a pass-
word policy and a timeout period. "For
example, administrators can set policies for
four-character passwords or 15-character
passwords that have alpha, numeric, and
special characters." He elaborates, "It all
depends on what they feel is appropriate
for their organization.
Next is a policy for lock-
ing the handset after
a period of inactivity.
This could be [for] one
minute to eight hours,
depending on what poli-
cy is set. Setting these
two policies at least locks
the front door by protect-
ing a smartphone from
unauthorized access. If
someone keys the pass-
word incorrectly too
many times, all of the
data on the handset will
be erased."
Amszej also says that if
information is extremely
sensitive, an organization
can turn on content pro-
tection so that the data
is stored in encrypted
form. "Again, this is a
policy that administrators
can set."
Mort Rosenthal, found-
er and CEO of Enterprise
Mobile (www. enterprise
mobile.com), says mobile
device rules and regula-
tions must be controlled
with IT-managed tools, "per the company's
security policy." He notes, "Depending on
the applications, industry, and compliance
requirements, enterprises need various lev-
els of security, encryption, authentication,
and audit ability. Certain functions should
be allowed on the devices, and others must
be removed. Any device that is expected to
be sold to an enterprise needs to be ready
for this kind of IT management. Device
from the office or traveling for extended periods
of time may want to consider carrying a spare
battery for their smartphone," Amszej explains.
"In the event that their battery runs low and they
do not have access to a power supply to
recharge it, or they have no time to recharge it
while on the go, they can simply replace it to
stay connected."
management is a requirement when it
comes to mobility."
Managing A Lost Smartphone
Because smartphones are very personal
in nature, they can go everywhere the
mobile worker goes. This means that there
is the possibility that a smartphone can be
lost, stolen, or left behind. Amszej says it is
important for smartphone users to know
who to contact within their organization in
the event of a lost or stolen smartphone to
ensure that the necessary steps are taken to
prevent access to smartphone content by
unauthorized persons.
He explains, "Depending on the smart-
phone server software, IT administrators
have a number of remote capabilities to han-
dle these situations. For example, they may
have the ability to remotely lock a device in
the event that it is not password-protected. If
needed, they can go a step further and send a
command to remotely wipe the data from
the smartphone. In both cases, the handset
reports back to the server that the command
has been processed so administrators can
confirm that the action has been taken."
In addition, Amszej says IT may also
have the ability to post a message on the
smartphone' s screen with instructions for
returning the lost smartphone to its owner
(such as, "If found, please contact . . .").
Page 11
Smartphone Usage In & Out
Of Network Coverage
While access to wireless networks has
improved significantly in recent years,
enterprise travelers continue to find them-
selves roaming in and out of network cov-
erage throughout the workday as they go
into large office buildings, elevators, and
underground parking garages and during air
travel. Amszej says in these instances, it
helps to have a smartphone that can be used
out of network coverage to stay produc-
tive — to read and queue up responses to
email, find an address, or review docu-
ments or presentations
that they have stored
on their smartphones,
for example. He adds,
"Smartphones enabled
[with] push technology
ensure that queued-up
email and other content is
exchanged immediately
once back in range of a
wireless network."
Different Life Cycle
Expectations
For Enterprise Devices
Rosenthal says choos-
ing a mobility platform
for the enterprise can
be challenging. One of
fthe biggest reasons for
this, he explains, is that
deployments typically
take longer, and the
shelf life for devices
needs to last longer than
that of consumer mobile
devices. "Yet enterprises
are expected to make
platform and device se-
lections just as a con-
sumer would, with as
much visibility as a con-
sumer," Rosenthal says. "The enterprise
planning horizon is certainly longer, and
as a result, enterprises need to be privy to
the longer-term view and product road-
map. If you are planning a major deploy-
ment in 90 days, you need to be able to
select a device from everything that will
be available in 90 days."
To resolve these issues, Rosenthal rec-
ommends managing the back end of a
product's life cycle, which, he says, will
ultimately match the life cycle to business
requirements. He notes, "If an enterprise
is in the middle of a deployment, there
is an expectation that the standard device
for that deployment will continue to be
available throughout the deployment and
for replacements. Yet in the consumer-
driven mobile market today, devices
launch and disappear in an instant. A
device emerges without warning (or an
ability to plan for it), and it disappears
just as quickly."
Networking & VPN
August 29, 2008
Compliance Is Key
Maintain Compliance Standards With
Secure Elements' C5 Compliance Platform
Industry standards exist for a reason,
but that doesn't make achieving compli-
ance with every regulation any easier.
Secure Elements' C5 Compliance Plat-
form is a tool designed to enable an enter-
prise to audit and evaluate its level of com-
pliance all in one place and with one prod-
uct. Further, the C5 Compliance Platform
helps companies implement the necessary
changes if and when compliance gaps are
present relating to internal, industry, or reg-
ulatory policies for IT control and security.
The latest update to the platform is the
ability to audit and manage EPA Energy
Star settings for Windows XP and Vista
computers. Now, companies can more
easily comply with the mandate for com- centralized management of element sensors,
puters and monitors to "sleep" when not which are lightweight software agents.
in use. Command Center offers unified views of a
Other features of the C5 Compliance company's entire compliance posture, and
Platform include configuration compliance the compliance content library is maintained
scores, vulnerability scores, patch scores, by C5's Security Labs professionals.
and authorized software compliance ^ _, ^ ,.
^ , 11 Secure Elements C5 Compliance
scores. Benerits or the platrorm include Platform
smart automation, which results in fewer
errors, repeatable processes, and pre- Starts at $25,000
dictable results; unified views for quick cnokuo^^.^^^^^^^^^ on.^ ^^nonn
, , , . r • 1 Enables companies to audit, evaluate, and manage
summary and detailed views of monitored compliance issues
assets; and overall improved compliance.
The C5 Compliance Platform is com- (703) 709-5011
posed of four parts: C5 Element Manager, www.secure-elements.com
C5 Element Sensors, C5 Command Center,
and C5 Compliance Content. Element SBCUrB elements®
Manager is an Intel-based lU server for ^ audit, evaluate. comply.
Page 12
Processor.com
Access Anxiety
Solving Five Common
Remote Access Issues
by Kurt Marko
• • •
IT AND THE APPLICATIONS AND DATA it
provides serve as the brains of today's
enterprise, and networks are its nervous
system. Networked applications and ser-
vices are critical to business operations, but
companies can no longer assume that the
employees using those critical systems are
within the friendly confines of a corporate
intranet. The increasing mobility of today's
workforce means users expect access from
anywhere, anytime, from tele workers man-
aging email on the weekends to mobile pro-
fessionals running CRM applications from
their hotel rooms or in airport lounges. As
such, IT departments recognize the need for
remote network access as a given, but
while the necessary technology is mature
and relatively inexpensive, it presents a
heap of potential security, support, and
integration issues.
Usage Complexity
Since the demise of dedicated dial-up
lines, remote access has been provided over
the public Internet using tunneling proto-
cols such as IPSec and PPTP to create
VPNs. Yet on the client side, traditional
VPNs can be tricky to set up and configure,
often requiring sophisticated knowledge of
networking concepts, says Dirk Morris,
CTO of Untangle (www.untangle.com).
Yet Sarit Beck, product marketing manager
at Citrix (www.citrix.com), finds that
sometimes "users don't want to learn any-
thing new; they don't want to adjust."
VPN clients can sometimes be preconfig-
ured via an installer script; however, net-
working problems can still arise for myriad
reasons. Morris notes that IP addresses may
overlap between external public networks
and a company's internal intranet, or the
routing tables on a client PC may become
corrupted. Alternatively, an external net-
work (which may simply consist of a Wi-Fi
firewall/router run by the biggest geek on
the hotel staff) may not perform network
address translation correctly.
Although traditional tunneling VPNs
offer maximal flexibility, the added com-
plexity is often not worth the cost. In-
creasingly, companies are ditching these in
preference of a Web-based SSL VPN.
According to Gartner ana-
lyst John Girard, "SSL
VPNs have superseded
IPSec (the Internet securi-
ty protocol) as the easiest
choice for casual and ad-
hoc employee VPN access
requests and for business
partners, external main-
tenance providers, and
retired associates. SSL
VPNs are easy to set up as
application portals and as
viable replacements for
IPSec remote access."
Another option, tailored
for users with an office-
bound desktop machine
needing occasional remote
access, entails turning
remote systems into thin
clients running all applica-
tions on an office PC, a
functionality that is available through any
number of remote desktop products.
Network Integration
Building a remote access solution means
putting a server or appliance that supports
the requisite VPN protocols inside the cor-
porate network. Because this device sits
behind a company's firewall, connectivity,
routing, or security impediments can arise
when configuring firewall, intrusion detec-
tion, or protection rules to allow external
traffic access to the internal VPN gateway,
says Andrew Cheung, president and CEO
of 01 Communique (www.01com.com).
One solution targeted to SMEs is an inte-
grated UTM (unified threat management)/
VPN device. These are usually dedicated
hardware appliances; however, software
products can unleash similar functionality
from an industry- standard server.
According to Morris, SSL VPNs also
simplify infrastructure integration because
September 26, 2008
applications now offer Web front-ends as
an alternative to their native clients, SSL
shouldn't be an issue for most, says Morris.
Mobile Connectivity
Given the rich, data-intensive Web appli-
cations used by today's office workers,
remote access virtually requires some form
of broadband connection. While this isn't
much of an issue for home tele workers with
wired connections, getting a good network
link on the road can be a challenge. Wi-Fi
still isn't completely all-encompassing, and
even where it's freely available, security
can be problematic. Without Wi-Fi, users
may likely be forced to rely on analog dial-
up, which unleashes a new set of prob-
lems — everything from noisy phone lines
Most Common Problem: Data Security
The impact of remote access on information
security is the biggest concern of IT man-
agers. In the words of Andrew Cheung, presi-
dent and CEO of remote desktop provider 01
Communique (www.01com.com), "Security is
issue No. 1, No. 2, and No. 3." Vulnerabilities
exist both in data transit over public networks
and with files resident on mobile devices. The
problem of in-transit network security has long
been solved via various encrypted VPN tech-
nologies, yet VPNs still require strong forms of
user authentication and do nothing to protect
data on clients.
Username and password authentication has a
litany of known vulnerabilities and so is often
augmented with either one-time passwords or
hardware encryption keys (usually a smartcard
or USB key). Data on clients can be protected
using a number of disparate techniques. One
option touted by Cheung is the thin-client and
remote desktop model with users accessing
all applications and data on a secure internal
system. Another approach is to accept the in-
evitability of users storing sensitive data on their
laptops by fortifying these vulnerable systems
via disk or file encryption.
their traffic runs over standard HTTPS port
443, which firewalls universally permit.
The thin client/remote desktop approach
can also simplify network integration
because its connection path uses an exter-
nal service provider, again via standard
SSL, to broker communications between
the remote client and internal host machine.
Application Access
The ultimate goal of remote access is,
of course, access, whether to internal
applications or data; however, Morris
notes that remote users may be unable to
get full, unfettered access to some appli-
cations and services. For example, many
SSL VPNs don't support non- Web-based
protocols. Likewise, Morris says client
applications that need direct access to an
internal database probably won't work
through an SSL VPN.
For users requiring full, transparent
access to internal networks, just as if they
were in the office, the only solutions are
either the traditional tunneling VPN, such
as IPSec or PPTP, or a remote desktop dis-
play. Those that can live with Web-based
applications are better off with a sim-
pler SSL VPN. Because most enterprise
causing dropped or slow connections to
modem configuration issues.
One solution that can significantly
increase the availability and security of
wireless access is to contract with a Wi-Fi
aggregation service. Additionally, mobile
high-speed 3G data services from one of
the major carriers offer greater geographic
coverage, although they are relatively ex-
pensive — often more than double the price
of a wired broadband connection.
User Setup & Support
Mobile users work anywhere, anytime
and thus are more likely to have IT support
questions at odd hours. SMEs with limited
support staff designed for weekday cover-
age may be faced with frustrated users if
they can't resolve problems after-hours or
on weekends. The traditional solution —
comprehensive user support outsourcing —
may be overkill for just a few remote users;
however, third-party remote control ser-
vices can fill the gap with their high-avail-
ability infrastructure and 24/7 support,
according to Citrix' s Beck. Similarly, Wi-
Fi aggregation services are generally
staffed to handle customers' connectivity
problems at all hours.
Messaging & Telephony
August 22, 2008
Archived Email
At Your Fingertips
Comprehensive, Easy-To-Use
& Affordable Message Archiving
The Barracuda Message Archiver is an
integrated hardware and software solution
designed to archive email communications
sent and received by enterprise users. It
automatically stores and indexes all email
messages in real-time while making them
available for rapid searching and retrieval
by authorized users. To immediately cap-
ture new messages, Message Archiver
takes advantage of the journaling feature
of Microsoft Exchange and other stan-
dards-based email servers. It can also
import historical emails and PST files for
a complete archive.
Right out of the box, you can satisfy any
legal requirement to retain your email with-
out the integration hurdles of software-only
solutions or security and network implica-
tions when using hosted services. You can
search the archives and create alerts for any
email that may violate either standard or
custom policies. Using a sophisticated
roles-based user interface and tamper-resis-
tant storage, you can enforce internal access
control policies to help comply with corpo-
rate policies and regulatory compliance.
The Barracuda Message Archiver takes
advantage of Barracuda Networks' exper-
tise in threat protection by ensuring that
historical emails are scanned for viruses,
spyware, and other malware threats before
they are retrieved. Energize Updates keep
the system up to date with the most cur-
rent policy definitions, updates to the lat-
est document file formats needed to
decode content within email attachments,
and security updates against the latest vul-
nerabilities and malware threats.
Barracuda Message Archiver
Starts at $4,999 with no per-user license fees
Arcliive email communications sent and received by
users throughout your organization
(888) 268-4772
www.barracuda.com
MKACm
NETWORKS
September 26, 2008
Processor.com
Page 13
Clients
August 15, 2008
Simplify Web Development
Gizmox Visual WebGui For Silverlight
Streamlines Enterprise Applications
The development cycle of enterprise
applications is critical for programmable
Web plug-ins such as Microsoft Silverlight.
A RAD (rapid application development)
framework is one tool that can reduce over-
all development cycles. Gizmox has devel-
oped the Visual WebGui for this precise
purpose, while still offering great flexibility.
Visual WebGui is a graphical user inter-
face that enables Microsoft Silverlight for
rich data-centric Internet applications suited
for enterprises. The framework introduces
seamless integration to Visual Studio and
offers the Web developer simplicity through
its Windows Forms drag-and-drop interface
design. Additionally, WebGui incorporates
the ASP.NET deployment model and
allows full Silverlight graphics capabilities.
Executing complex AJAX applications
can require a sharp learning curve; how-
ever. Visual WebGui features server- side
controls that function in the same manner
as desktop application controls, effective-
ly replacing AJAX browser controls in
runtime. The WebGui complete control
toolkit currently contains more than 50
customizable out-of-the-box implemented
for decoupled presentation in either
DHTML or Silverlight layers.
The user-friendly interface is easy to
deploy for complex enterprise-level AJAX
applications thanks to WinForms API and
design-time support. Powerful object-ori-
ented programming transports AJAX
without consuming more than 1% of
bandwidth. Visual WebGui application
security is military-grade, as well, because
it runs on the server, so the browser oper-
ates as a viewing pane to the server, and
no sensitive data is transferred.
Gizmox Visual WebGui
Standard Server + SDK for $1 ,500 per developer seat
per year; Standard Silverlight extension + SDK for
$500 per year; Standard Silverlight Extension +
Standard Server + SDK for $190 per developer seat
per year
Open-source RAD platform for Microsoft Silverlight
Web IT applications
+972-9-7673063
www.visualwebgui.com
(^Visual WebGuu
bringing AJAX & Silverliglit to enterprises
Networking & VPN
August 8, 2008
Manage Media Networks
Packet Island PacketSmart-Lite Platform ^
Troubleshoots Voice & Data Networks
PacketSm&rt-Lite Server
PacketSmart-Lite, an entry-level version
of Packet Island's PacketSmart platform, is
ideal for small and medium-sized business-
es. PacketSmart-Lite includes everything
needed to quickly and reliably troubleshoot
voice/data networks for up to 10 differ-
ent sites of 50 to 200 phones each. Each
platform comes with a Linux-based Dell
server fully loaded with Packet Island's pro-
prietary PacketSmart software component
and five compact micro appliances that
provide sniffing
and call genera-
tion capability
from each site
remotely. Each
microappliance
can handle up to
20 concurrent
calls. SIP,
MGCP, and Cisco proprietary signalin
protocols are supported.
The PacketSmart platform provides
convenient 24x7 remote monitoring for
each site, allowing deep visibility into
network issues that cause
voice, video, and data degra-
dation. A browser-indepen-
dent, Java-based GUI allows
quick retrieval of critical data,
such as jitter, MOS, dropped
packets, router path, traffic
spikes/transient effects, and
even full packet capture.
^^--^ Comprehensive reports are
available to give you a reli-
^'^'''^j able and automated snapshot
of the state of your network.
IT administrators can use the solution to
perform the following functions:
3nllffir * CaV QeHiftraicir
• Assess data networks for VoIP readiness
• Troubleshoot VoIP signaling issues
• Verify LANAVAN QoS design based on
TOS or Diffserv
• Monitor live VoIP calls on a 24x7 basis
• Remote packet capture with
EtherealAVireshark compatibility
• Monitor Top- 1 data flows
• Generate a variety of on-demand reports
Packet Island's PacketSmart-Lite
Starts at $8,000
Troubleshoots voice/data networks for up to 10
different sites of 50 to 200 pliones eacli
Security
August 8, 2008
A New Mindset
For Security
Parasoft Application Security Solution Improves Productivity
security vulnerabilities and provides an
automated system that applies state-of-
the-art analyses throughout all stages of
the SDLC, testing the application from
the inside-out and outside-in to identify
potential vulnerabilities.
No matter what your motivation,
Parasoft' s unique automated infrastruc-
ture drives your development process to
ensure that it remains on track and does
not disrupt the team's workflow.
Analysis capabilities include rule-based
static analysis, peer code review process
automation, data flow static analysis, pen-
etration testing, runtime analysis/mon-
itoring, and continuous regression testing.
Process/workflow capabilities include
security policy development, centralized
policy management, automated infra-
structure, centralized reporting, and error
assignment and distribution.
Parasoft Application
Security Solution
Continuous security process tliat identifies and
remediates security vulnerabilities
(888) 305-0041
www.parasoft.com
You CAN IMPROVE SECURITY without
impeding your development productivi-
ty. How? Establish a continuous security
process with Parasoft Application Se-
curity Solution.
Parasoft solutions establish a continu-
ous process that identifies and remedi-
ates security vulnerabilities across every
stage of the SDLC and ingrains security
tasks into your team's workflow.
The Parasoft system automatically
monitors whether your security policies
are implemented in the code, applied at all
layers of the application stack, operate
correctly in the context of realistic scenar-
ios, and persist as the application evolves.
It delivers a "jump start" solution for
preventing the most likely application
UPARASOFl
(408) 329-9608
www.Packetlsland.com
PACKET ISLAND
Page 14
Processor.com
September 26, 2008
Physical Infrastructure
Sentry 30-A Fail-Safe Transfer Switch
Provides fail-safe redundant power to single-power corded
equipment
Fast Transfer Rate— Power interruption will not affect equip-
ment uptime or performance
Patented arc-suppression and power in-feed sharing tech-
nology extend product life and performance
High Density— 100 to 240V and 16/32A
Server TechndosY/ Inc.
Server Technology Inc.
(800) 835-1515
www . se r ve rtec h . CO m
Physical Infrastructure
NETWORK Series Network Rack
Prices starting at
$1,042
RACKMOUNT
SOLUTIONS, LTD
ISO 9001:2000 Certified
Need a COMM rack with the
rack rails moved to one side
to accommodate large cable
bundles?
You have the option to slide
your vertical rack rails hori-
zontally as well as vertically.
Set your rackmount width to
19 or 23 inches. Talk about
versatility!
Slide the rack rails to one
side of the cabinet, allowing
for additional 4 to 9 inches, of
space on the opposite side to
run large cable bundles.
Rackmount Solutions Ltd.
(866) 207-6631
www.rackmountsolutions.net
Physical Infrastructure
CatSE And Cat 6 Cables
We're more than a Rackmount Company! A complete line
of CatSE, Cat 6 cables, including excellent bulk pricing.
• CatSE patch and Cat 6 patch panels
• Molded, snagless, strain-relief booted patch cables
• Custom cable assemblies
• CatSE and Cat 6 bulk UTP network cables
• SVGA super monitor cables and VGA extenders
RACKMOUNT
SOLUTIONS, LTD
ISO 9001:2000 Certified
Rackmount Solutions Ltd.
(866) 207-6631
www.rackmountsolutions.net
Physical Infrastructure
Low Profile 19" Server Rack Cabinet
Choose from a large selection of four different series to
find a cabinet for your specific application.
• Available in variety of sizes: From 3U-25U
• Usable cabinet depth from 22.5"D to 34.5"D
• Universal rack rails fit all major brand servers
• use Series shown
To Learn More,
Visit: www.iscdfw.com
Ik
TM Information Support ConcGpts,iNc
Leading Information Technofogy Products Since 1587
Information Support Concepts Inc.
(800) 458-6255
www.iscdfw.com
Physical Infrastructure
CS-27V Sentry Smart CDU
Provides reliable power distri-
bution. Use one IP address
across different power circuits.
• High Density
• Multiple Voltage Outputs
• Input Current Monitoring
• IP Access & Security
• Alerts for Power &
Environmental Conditions
• NEW! Fuse Retractors for
Branch Circuit Protection
• Environmental (Temperature
& Humidity) Monitoring
• NEW! Linking for Smart
CDU (Expansion Modules)
Server TechnoEosy, Inc.
Server Technology Inc.
(800) 835-1515
www.servertech.com
Physical Infrastructure
Air Conditioned Server Cabinet
Prices starting at
$3,420
RACKMOUNT
SOLUTIONS, LTD
ISO 9001:2000 Certified
• From 1 ,800 to 20,000 BTU
• Rackmount and Sidemount
• Three sets of L-shaped
universal vertical rails
• Base, casters, and leveling
feet standard
• Removable side panels
• Lexan front door (or solid
steel) w/ lockable handle
• Steel rear door with lockable
swing door handle
• Avail, in heights of 24u, 30u,
35u, 40u, 42u, 44u, 48u;
depths of 24", 30", 36" and
42"; widths of 19", 23"&24"
Rackmount Solutions Ltd.
(866) 207-6631
www.rackmountsolutions.net
Physical Infrastructure
CS-3AVY Sentry Smart CDU
/Provides reliable 3-Phase
power distribution. Multiple out-
let types distribute multiple volt-
ages via 3-Phase 208V Wye
power in-feed.
Server TechnoEosKr inc.
• High Density
• Multiple Voltage Outputs
• Input Current Monitor
• IP Access & Security
• SN MP Traps
• Environmental (Temperature
& Humidity) Monitoring
• Branch Circuit Protection
• NEW! Linking for Smart
CDU (Expansion Modules)
Server Technology Inc.
(800) 835-1515
www . se rve rtech . com
Physical Infrastructure
24 Receptacles
LCD Display
RS232 Access
RPC 22
24 Receptacle Remote Power Monitoring & Distribution
Current, Voltage, Power, and Temp Monitoring
LCD Screen Display
RS232 Interface 120/208VAC 10,20,30A Models
Power Distribution and Monitoring In One Unit
BayTech
(800) 523-2702
www.baytech.net
Physical Infrastructure
Classic Series - Portable Air Conditioning
Ideal For:
• Server Rooms
• Electronic Equipment
• Primary, Supplemental, or
Emergency Cooling
Featuring:
• Rentals and Sales
• Installs in Minutes
• Locations Nationwide
MOVINCOOL
PREFERRED DISTRIBUTOR
IWs^inCDOi, Spotcooi SKI Ottks Piio are
to Sales Memals. Inc.
THE PORTABLE COOLING & HEATING SPECIALISTS
Atlas Sales & Rentals Inc.
(800) 972-6600
www.atlassales.com
Physical Infrastructure
Measure
Your environment, your cooling performance,
your power.
K3 Resource Manager
AFCO Systems' unique combination of capabilities brings you
the ability to plan, implement, or upgrade your data center
facilities. Whether you require CFD modeling services, CAD
modeling, or other data center planning services, AFCO
systems is able to execute. Talk to AFCO and enable your
ability to measure, manage, monitor, and maintain your critical
data center facilities.
AFCO Systems
Datacenter Resource Solutions
AFCO Systems
(613) 249-9441
www . at cosystem s . co m
Physical Infrastructure
$2797
Meets any price!
CoolCube 10
RACK IT - STACK IT - MOUNT IT - HANG IT
Tired of Overheated Server Rooms? The CoolCube 10
Offers an Exceptional Cooling Solution for Electronics
50% smaller than competitors, provides 10,000 btu/hr
Installs into any 2- or 4-post 19" rack or is portable in room
Automatic restart function for power outages
Cost-effective for after-hours and weekend cooling
Uses standard 1 15 VAC power source
RACKMOUNT
SOLUTIONS, LTD
ISO 9001:2000 Certified
Rackmount Solutions Ltd.
(866) 207-6631
www.rackmountsolutions.net
Physical Infrastructure
V Rack Wall Or Under Table Mount
Not everything In
life Is complicated.
VRack
Simple-Cost Effective-In Stock
• 19"w, 2u, 3u or 4u mounts
to wall or under table
• Utilizes small spaces
• Supports 200 lbs
• 14 gauge steel, cold roll steel
• Black powder coat finish
• Universal square mounting
holes (screws to attach to
wall are not included)
Rackmount Solutions Ltd.
(866) 207-6631
www.rackmountsolutions.net
RACKMOUNT
SOLUTIONS, LTD
ISO 9001 2000 Certified
September 26, 2008
Processor.com
Page 15
Physical Infrastructure
CYBER ©SWITCHING'
■
Dualcom S
Cyber Breaker^ the Virtual Circuit Breaker™
IVIonitor and manage current consumption at EACH outlet
TCP/IP or RS-232
SNMP management
Available with Enterprise Management Console™ (EMC) with
Virtual PDU™
CYBER@SWITCHING
®
Cyber Switching Inc.
(888)311-6277
www.cyberswitching.com
Physical Infrastructure
KoldLok Mini Raised Floor Grommet
The KoldLok® Mini Raised Floor Grommet expands the
product family to offer a smaller, 4- x 6-inch (100 x 150 mm),
patent-pending thermal management sealing solution for
airflow challenges.
• Fire-rated and competitively priced
• Saves energy and optimizes existing cooling equipment
• Offered with or without static-dissipative feature
designed and
manufactured by
upsite
technologies
Upsite Technologies
(888) 982-7800
www.upsite.com
Physical Infrastructure
KVM Switch
Modular KVM Switch
1U DualRail sliding Drawer
Plug & Play CAT5/ IP KVM
Modules
OEM Design
Cost- Effective Solution
Design & Manufacturing Partner
(714) 444-2390
www.broadrack.com
Physical Infrastructure
Swltclied CDU CW-24V2
Server Technologyf Inc.
Power cycle individual or
groups of outlets to remotely
reboot network devices.
• 208V to 240V Single or 3-
Phase power at 20 or 30A
• Access and Security: Web
interface, SSL, SSH, Telnet,
SNMP, LDAP, TACACS-h,
and RS-232 access
• Environmental Monitoring
• Fuse Retractor
• High-Density 24 lEC CI 3
Server Technology Inc.
(800) 835-1515
www . se rve rtech.com
Physical Infrastructure
RS232 Access
I Rebootable Receptacles
RPC14
8 Receptacle Power Control and Monitoring
Current, Voltage, Power, and Temp Monitoring
LCD Screen displays power monitoring information
RS232 interface, 120/208VAC 10,20,30A Models
Turn On, Off, or Reboot any or All Receptacles
BayTech
(800) 523-2702
www.baytech.net
Storage
ARAID 2200 SATA/USB/eSATA
• Never lose data from a hard disk crash again
• Easy to install and use on any server or PC
• Keeps data mirrored on two drives at all times
• No additional software or hardware is needed
• Computer keeps operating even when one drive fails
• Makes tape drives obsolete
• $395 with free shipping
Accordance Systems
(866) 334-4446
www.accordancesusyems.com
Physical Infrastructure
1U 20.1" Rackmount LCD IVIonitor Drawer
Separate Single rail design. Easy to install by one person.
LCD Auto Shut off when it is in Closed Position
LCD Panel protected by tempered glass
Modular design scalable to 8/16 Combo KVM or
8/16/32 cats KVM
IP KVM and 2 Consoles via CATS Extenders options
l-TECH
COMPAIMY
l-Tech Company
(888) 483-2418
www.i-techcompany.com
Physical Infrastructure
RS232 Port
4 receptacles
per side
RPC18
8 Receptacle Power Control / Monitoring w/Trans Switch
• Current, Voltage, Power, and Temp Monitoring
• Automatic Transfer Switch
• RS232 or Network Interface 120/208VAC 10, 20, 30A Models
• Turn On, Off, or Reboot any or All Receptacles
BayTech
(800) 523-2702
www.baytech.net
Storage
^ i i : \ ^
HP StorageWorks 6000 Series
Virtual Tape Libraries
Models: VLS6510, VLS6518, VLS6840, VLS6870
Up to 70TB of HD Storage and 600MB/sec Transfer Speeds
Use Your Existing Backup Software
HP Warranty
Fantastic Low Pricing On These New Units
To Learn More, Visit: www.magnext.com
B MAGNET
DATA BACKUP SOLUTIONS
Magnext Ltd.
(888) NOW-TAPE (669-8273)
(614) 433-0011
i
Name:
Street Address:
City, Stat e, ZIP Code:
Phone: ( )
Email:
IVIethod Of Payment:
□ Check
□ Visa
Credit Card #
Signature:
Part#:
IVIodel/Description:
Contact:
I Phone: (
L Fax: (
State/Country:
□ IVIoney Order
□ Discover
□ IVIastercard
□ American Express
Exp.
Manufacturer:
Price:
Color picture
Detailed product
description
■ Web exposure
. Only $176 an issue
(12-issue minimum)
• Proven publication
BiiBd Your Brand
Awareness!
PROCESSORSHOWCJ^
See us en the
internet at:
PrDcessDr.com
J PROCESSOR
Call Today: (800) 247-4880
Page 16
Processor.com
September 26, 2008
Product of the Week
S af e Tape
Media Disposal
RecycleYourMedia.com Combines
Green Services With Security Guarantees
by Bruce Gain
IT ADMINS GENERALLY know by now that
getting rid of old electronics equipment
involves more than just having it hauled off
with little concern about where it ends up
as long as it no longer remains on the
premises. Yet the importance of properly
disposing of and recycling storage tape and
other electronics media is not some-
thing that CTOs, admins, and others in the
IT field necessarily think about a lot.
Unfortunately, though, making sure stor-
age tapes and other electronics equipment
is properly disposed of is something that
merits a lot of concern. Breaking environ-
mental laws, for example, can lead to civil
li^ecv cleYourMedia
RecycleYour
Media.com Tape
Media Disposal
Description: RecycleYourMedia.com takes
on unused or obsolete media, wipes it for
guaranteed security, and safely disposes of it
or recycles it where possible — an environ-
mentally friendly alternative to destroying or
dumping material.
Interesting Fact: RecycleYourMedia.com
offers its disposal and recycling services on a
nationwide basis.
(877) 798-2737
www.recycleyourmedia.com
penalties and, in some cases, criminal prose-
cution. Security risks for which admins can
be liable are vast, yet many enterprises are
unaware of what is at stake; most executives
handling and the fact that we go above and
beyond the typical standards of secure end-
of-life data solutions," Musil says.
The firm's mission is to meet the
needs of a market space that has evolved.
"The IT recycling market itself has been
rapidly growing over the last several years.
Companies are becoming more aware of
in large U.S. firms, for example, are unaware
of the risks involved with not heeding envi-
ronmental laws and the costs of proper elec-
tronics disposal, according to a survey by HP
Financial Services, the leasing and financial
services subsidiary of HP (www.hp.com).
Then there are the environmental con-
cerns of tape and electronics waste dispos-
al. According to U.S. EPA (Environmental
Protection Agency) statistics, about 235
million units of electronics products sold
between 1980 and 2007 had accumulated in
storage as of 2007. Electronics recycling is
starting to have an effect on eliminating the
amount of the waste that ends up in land-
fills now that several states have passed
legislation mandating recycling. But while
the percentage of electronics recycling is
increasing, the EPA says, the recycling rate
only increased to 18% from 2006 to 2007.
Responsible Recycling
Seeking ways to recycle tape media
instead of dumping the media in a landfill
is one way admins can play a part in elimi-
nating electronics waste. To that end,
RecycleYourMedia.com (877/798-2737;
www.recycleyourmedia.com) offers envi-
ronmentally friendly tape disposal with
strict data security guarantees.
RecycleYourMedia.com' s service is
unique because "it is 100% environmental-
ly friendly," says Brian Musil, senior stor-
age acquisitions manager and data eradica-
tion specialist for RecycleYourMedia.com.
"We shred the data and not the reusable
tape cartridge."
Then there are the security guarantees
RecycleYourMedia.com offers. "Another
unique part of our service is the extensive
being 'green' and doing their part to help
the environment," Musil says. "Due to the
growth and need for secure data eradica-
tion, our standards and practices have had
to become better, safer, and more secure."
The Security Guarantee
The principle concern of many admins is
to make sure that their data stored on tape is
safely and securely removed once they sur-
render it to a third party during the disposal
process. Doing one's part to help reduce
landfill waste and to seek environmentally
friendly options when getting rid of old tape
shipped as they arrive in its warehouse,
which RecycleYourMedia.com says is
locked down and protected by alarm sys-
tems. RecycleYourMedia.com then emails
the photos to the enterprise to verify that
the packages have not been tampered with
during the transit. The tapes received
are also checked against the purchase order
list to make sure nothing is missing. Then,
the data removal process is scheduled as
soon as the equipment arrives.
RecycleYourMedia.com' s data removal
process is a key element in its offering,
which the firm also says distinguishes it from
the competition. "Many competitors will bro-
ker out to third parties or not fully erase the
data but just erase enough to be able to resell
an inferior product," Musil says. "This is
very dangerous to your company to leave
your clients' confidential information in the
hands of a third party, and you should always
deal with a reputable company that will fully
eradicate all of the data."
Indeed, Adam S. Lewis, a computer spe-
cialist for WTW Architects (www.wtw
architects.com), believes proof of security
and compliance is vital to a good disposal
and recycling company and appreciates
RecycleYourMedia.com' s documenta-
tion. "They give a certificate saying that the
data was deleted in a legal way," Lewis says.
The Environmental Factor
RecycleYourMedia.com' s policy is to
also assure that tape is recycled whenever
possible. For example, the firm's process of
deleting data but recycling the reusable
tape cartridge serves as an environmentally
friendly alternative compared to merely
destroying the entire tape, Musil says. "The
I
"Many competitors will broker out to third
parties or not fully erase the data but just erase
enough to be able to resell an inferior product."
- RecycleYourMedia.com's Brian Musii
J
is important, of course. However, security
risks involved in electronics disposal in
general remain a key concern, especially
when storage media is involved.
"[You need] to know when using
RecycleYourMedia.com that you are using
a company . . . focused on safely and
securely eradicating data on tape media,"
Musil says. "We meet and exceed standards
on all laws, acts, policies, and compliance
that deal with secure data eradication."
RecycleYourMedia.com's security cer-
tificate guarantees that the data removal
process adheres to a strict protocol. For
example, the firm takes digital images
of the packages in which the tapes are
manufacturers state that these tapes have a
life expectancy of 1 million passes, but
average data centers will not even come
close to using the tape media to its actual
end of life," Musil says.
WTW's Lewis points out that Recycle-
YourMedia.com offers solutions that are
more beneficial for the environment com-
pared to firms that will just pick up and
dump your storage tapes. "It is nice to know
that [our old tapes] are not going to go in
some landfill. It is actually going to be
reused or disposed of properly," Lewis says.
A firm with accessible information and
guarantees about recycling as well as secu-
rity is hard to find, Lewis says.
Save
Yourself
Time
Wher^ you post a free Want-To-Buy
or For-Sale Listing at Processor.com.
you save more thar^ time. Hur^dreds
of the nation's leading computer
dealers will see your posting and
let you know if they have the
equipment you are looking for.
September 26, 2008
Processor.com
Page 17
Product @ Releases
Do you have a new product
that data center/IT managers would
be interested in learning about?
Send your press release or related product information
to press@processor.com.
Clients
■ 2X released 2X ThinClientServer version
6, which includes a new user-friendly Web-
based management console and features for
enhancing the performance and functionality
of the thin client OS and management sys-
tem. The 2X ThinClientServer deploys a
small-footprint Linux-based OS to popular
thin client devices and to old or new PCs and
laptops. The thin clients always boot the lat-
est version of the OS from the Thin-
ClientServer or locally, and hardware and
connection settings can be retrieved from the
server when the client logs on. Version 6.0
features support for automated grouping of
thin clients, improved booting time for all
types of 2X OS clients, and load balancing
and high availability for PXE booting.
■ AppSense announced Environment
Manager 8.0 for VMware VDI (Virtual
Desktop Infrastructure) to bring industrial-
strength policy and personalization capabil-
ities to VMware VDI customers. AppSense
Environment Manager 8.0 enables desktop
policy and personalization management
from one location to complement VMware
VDI environments. The software offers a
one-to-many pooled VDI that dynamically
personalizes the user environment on-
demand, which helps accelerate and simpli-
fy enterprise migration and management of
VMware VDI environments. Other advan-
tages include the reduction of enterprise
storage and infrastructure costs. With the
AppSense Environment Manager 8.0, IT
staff can separate user data from the desk-
top and remove the need to treat each envi-
ronment as a unique entity.
■ A new low- wattage Linux device is avail-
able from Chip PC. The Xtreme PC LX
thin client packs policy-based management
capabilities into a cold RISC architecture
based on the RMI Alchemy Aul250 proces-
sor. With domain authentication and Active
Directory management features, the Xtreme
PC LX can replace less power-efficient PCs
in VMware, Microsoft, and Citrix virtual-
ization servers, the company says.
■ Configuresoft has announced Con-
figuresoft Compliance Checker, a free
downloadable utility that helps VMware
customers ensure the compliance of security
guidelines across their ESX virtual
infrastructures with industry standards.
Compliance Checker provides real-time
compliance assessment of multiple ESX
hosts against the VMware Infrastructure 3
Security Hardening Guidelines and the CIS
(Center for Internet Security) VMware ESX
Server Benchmark. It also delivers compli-
ance assessment and audit-quality reports
for multiple ESX hosts at a time, testing
compliance against more than 250 rules.
■ New features have been added to the
EMC Replication Manager program, which
include the data protection capabilities for
VMware Infrastructure. EMC array-based
replicas are managed automatically under
Replication Manager, which helps hasten
backups for a more comprehensive report,
saves time, and increases staff and comput-
ing resources. Replication Manager now
manages copies and recovery of physical
and virtual environments via a single con-
sole, and VMware VMFS is directly inte-
grated, allowing for quick VMFS-level
backup and virtual machine-level restore.
■ NetApp announced offerings for VMware
customers, including enhanced NetApp
FlexClone technology; PAM (Performance
Accelerator Module); VM Insight Plug-in for
VMware VirtualCenter; and the NetApp
Storage Solution for VMware VDI (Virtual
Desktop Infrastructure), a combination of
hardware, software, and services that enable
VMware customers to do large-scale virtual
desktop deployments. NetApp 's FlexClone
technology has been enhanced to enable
rapid, space-efficient cloning of volumes,
LUNs, and individual files. NetApp PAM is
an intelligent-read cache that improves virtu-
al desktop performance for end users.
NetApp 's SANscreen VM Insight software
provides VMware customers with end-to-end
visibility into their virtual infrastructures,
allowing storage and server administration
teams to more easily manage their overall
storage and server architectures in tandem.
■ The B400 series of mono printers with
standard duplexing is now available from
OKI Data. The series includes the B410d,
B410dn, B430dn, and B420dn, which are
designed to offer enough different configu-
rations to satisfy any mono printing needs.
Intended for use in small and home offices,
the B400 series printers are designed for
low cost of ownership, affordable pricing,
and speed. Features include high duty
cycles up to 70,000 pages, print speeds of
30 pages per minute, and resolution up to
1,200 X 1,200 dpi.
■ Wyse Technology and Novell announced
Wyse Enhanced SuSE Linux Enterprise, the
next generation of the Linux operating sys-
tem designed for thin computing environ-
ments and available only on Wyse desktop
and mobile thin client devices. Integration
with Microsoft Active Directory and driver
and software support will enable enterprises
to deploy Wyse Enhanced SuSE Linux
Enterprise thin clients in a Windows envi-
ronment. The OS includes built-in support
for Wyse's suite of virtualization software,
enabling enterprises to take advantage of
third-party desktop virtualization solutions
such as Citrix XenDesktop and VMware
VDI (Virtual Desktop Infrastructure). Wyse
Enhanced SuSE Linux Enterprise includes
the GNOME desktop, Firefox browser, a ter-
minal emulator, and prebuilt technologies
for connecting to thin computing architec-
tures. It will be available preloaded on Wyse
thin client devices in the fourth quarter.
Go to Page 18
Clients
August 8, 2008
Networking & VPN
August 8, 2008
Enhanced CA Records
Management Solution
Helps Companies Streamline Records-Keeping Processes
HWvi Vi|lllinmBP_DOSVjI<;i
imm_tjmi_a_r**?wwi'i!i
CA Records Manager provides access to all content through a single
interface
CA Records Manager rl2 is the latest
version of the company's tool to help
enterprises automate record-keeping
processes. The program is designed to
give users faster access to information,
save time and money, and facilitate com-
pliance with regulatory requirements and
organizational policies. This new version
delivers increased functionality with its
records retention and disposition module,
a localizable Web client, and added fea-
tures to enhance the user experience.
CA Records Manager rl2 is also certi-
fied by the United States DoD (Depart-
ment of Defense) against the newly updat-
ed version 3 of the U.S. DoD 5015.2 stan-
dard, which provides for greater data
security and integrity. Because of its long
history of early and successful standards
adoption, CA was the first to
certify against the new, more
stringent standard.
"One of the most important
new features in Records
Manager rl2 is the creation
of an enhanced retention
module that is an interface to
perform all administrative
tasks related to retention and
disposition," says Reed Irvin,
vice president of product
management for CA. "Addi-
tionally, this release also delivers signifi-
cant enhancements focused on creating
transparency, declaring records more
efficiently, improving the user experi-
ence, and applying policy on all content
across the enterprise. For instance, new
scripted email notification capabilities
are designed to send an email notifica-
tion to selected recipients when your
specific defined criteria are not met
within a specified time frame."
CA Records Manager r12
Records management solution designed to lielp
enterprises improve efficiency, automate processes
and reduce risl<
(800) 225-5224
littp://www.ca-ig.com/
ca
On-Demand Load Testing
AlertSite Provides SaaS Testing To Improve
Web Site Stability Before Launch
Response Time per URL
6.1 Page it V. Start Page
♦
: : : ; : : : : : «n «
Url 3
Url ?
Url li OCT tittp://v«Ui7>r.«l<rt>i.t«.csa!fO^
UKl a 1 GST littp.//y«llo».«la«L»lte.eciffliSO/fjiv ieen , i«i
UeI 3t GET bcKp://y«lIaw.aIeEtBite.cQa:id/at,yL«s.eaft
Url 4: GET http://rinllDw.alartBlta.c»i:e0^ji«/JlC_or7aga. ja
Ifrl i; iSi http://yi*ll!w<«l«rtiit*,eo(«!80^i™gM/(Hww_feitTir*_iil_iMil,3pg
ml 6t GET https //ifellow.aiertfllte.eoai:40/JiJBaflaa./hoiiia_£eatufe_ql_ao jaellek. 3pfl
Url ?: GET http://]rellow.aliirtiite.c»i:A0^u»9«s/h«ia_fa4ture_ql_slu;oaplian.ip?
Ifrl 8; tJET http: i'/ifi*llo«,«l*rtii.to-ew:#0^i™g«i/hflM_f«Btuir*_ql_p**l!|s»rfsr™, jpg
AlertSlte's On-Demand Load Testing offers immediate
reports.
Web sites are launched every day, but
it's Hkely many have httle or no idea if the
site will be able to handle the loads it will
encounter. The result is many Web sites
experiencing errors that could have been
avoided with some robust load testing.
AlertSite addresses this need with the
release of On-Demand Load Testing, a
SaaS (software as a service) application
that is designed to offer businesses quick,
simple, and intuitive load testing that
simulates actual user loads. On-Demand
Load Testing is designed to help compa-
nies identify scalability issues, bolster the
infrastructure, and prevent site crashes so
customers never experience downtime.
By leveraging AlertSite' s DejaClick
technology, which simplifies the testing,
design, and setup processes, virtually
any user can build and deploy a load
test easily and review the results
quickly. Users can log on from any-
where in the world and quickly test.
There is no need for learning a
scripting language or acquiring spe-
cial equipment software or extra
personnel, which saves companies
money.
On-Demand Load Testing works
by simulating Web traffic from
thousands of simultaneous users.
Once the test is complete, the results
are instantly generated into an on-
demand report that shows a break-
down of Web site performance over
time. Users can test URLs at any time,
indicate the number of concurrent virtual
site visitors, and even specify the time of
day when automatic testing is per-
formed. Users can reuse the scripts that
are created from this process at any time
and as often as needed.
AlertSite On-Demand Load Testing
Pay as you go; prices vary according to needs
On-demand load testing for Web sites to improve
stability
(877) 302-5378
www.alertsite.com
HAlertSite.
Page 18
Processor.com
September 26, 2008
Product @ Releases
Short
on timo?
Processofs print issue and
Web site offer an unbeatable
combination!
When you're looking for product or buying
information, turn to the print issue for a
wide variety of current products from our
list of hand-selected manufacturers and
resellers, along with articles and
information to help you stay on top
of the industry.
Ready to buy? Turn to our Web site to find
companies offering the products and
services you need.
Prnilucts. Ntwl tnHsramtinn Oj^i Cinlen Cj« TiuiL Sinei- If
Security Tips
ForTlieSME ^im^mM
I I'ih'usiii]:<)fi llitHt'lop tivt' lvtut> ('»iild Mv
I li t F»u tiiH >r I 'ri nil 1 1 r.in mir l>jtii (.'ui kr Ntiib,
Continued from Page 1 7
Wyse Technology also announced WDM
(Wyse Device Manager) 4.7, a software
management suite for thin clients that pro-
vides the tools IT administrators need to
track each hardware device and accompa-
nying software in their organizations. The
software can support 100,000 or more
simultaneously connected units. Wyse
added new security features to WDM 4.7 to
increase the protection of customers' IT
infrastructures. Designed to meet high lev-
els of security requirements for networks
carrying financial transactions, WDM 4.7 is
fully encrypted for network traffic and
offers secure device management features,
including self-signed HTTPS Certificate
Authentication, secure imaging through
HTTPS, and imaging through HTTP/FTP.
WDM 4.7 will be available in both work-
group and enterprise editions, and both edi-
tions include database support, automated
shutdown and wake-up, and remote execu-
tion and control. WDM 4.7 Enterprise
Edition, for large organizations, also
includes secure device management, dis-
tributed architecture for scalability and
security, improved network interoperability,
and comprehensive device configuration
and policy management. WDM 4.7
Workgroup and Enterprise software editions
will be available at the end of this month.
Additionally, an updated Virtualization
Software suite intended to provide USB
peripheral and multimedia capabilities
designed for Wyse thin clients connected to
virtual desktop environments from Citrix,
VMware, and Microsoft is now avail-
able from Wyse Technology. TCX USB
Virtualizer 2.0 (beta) and TCX Multimedia
3.0 software are part of the updated suite
and support Windows Vista virtual ma-
chines running on VMware VDI, Citrix
XenDesktop, and Microsoft Hyper-V. They
are designed to provide support for isochro-
nous devices and grant end users access to
a large variety of authorized USB devices.
Messaging & Telephony
■ Comodo has announced its free email
protection system, SecureEmail 1.1, which
allows private users to apply PKI-based
technologies to encrypt and digitally sign
emails. SecureEmail features automatic
certificate exchange, installation, and
updates and a built-in wizard for easy sign-
up and installation of a Comodo Free email
certificate. It is compatible with Microsoft
Outlook 2000 and above. Outlook Express,
Windows Mail, Incredimail, Mozilla
Internet Mail, Thunderbird, and other
S/MIME-capable email systems.
■ DidItBetter.com Software announced
its mobile solution, Add2Exchange Enter-
prise Sync Suite v5.9, which allows
Windows Mobile smartphone. Pocket PC,
and BlackBerry users to access and sync
Exchange public folders such as Outlook
calendars, contacts, and tasks. Once in
place, users can access their information
any time, anywhere, and on any device.
Add2Exchange includes three modules:
Add2Exchange for Calendars, Add2-
Exchange for Contacts, and Add2Exchange
for Tasks.
Put the power of Processor \o work for you
■ GSX has launched the GSX Monitor v9,
a version of its server monitoring and
reporting solution. The GSX Monitor v9 is
designed to provide enhanced email uptime
for organizations that have heterogeneous
unified communications server environ-
ments. Features include the ability to fore-
see reporting and analytics in order to warn
IT personnel of looming risks in real time;
reports and graphs that summarize past
trends on a daily, weekly, and monthly
basis; and remote access. GSX Monitor v9
also manages Exchange, Sametime, Web,
and BlackBerry servers without repetitive
monitoring tasks.
■ Panasonic has announced its line of i-Pro
network video surveillance solutions. The
line of management and control solutions
include i-Pro WV-ASX400 Management
Software, which accommodates up to 1,024
cameras, 128 recorders, and 64 decoders;
the WJ-GXD400 Multichannel High
Definition Video Decoder, which has an
HDMI interface and accommodates 256
cameras; the WV-NF302 Ruggedized
Megapixel Day/Night Fixed Dome Network
Camera, which features a 1,280- x 960-
megapixel image sensor; the WV-NP304
Megapixel Day/Night Network Camera, a
box camera similar to the WV-NF302; and
the WJ-ND400 Network Video Recorder,
which provides MPEG-4 and JPEG record-
ing and accommodates up to 64 cameras.
■ Polycom announced the Polycom DMA
(Distributed Media Application) 7000, a
network-based application that manages
and distributes multipoint video calls with-
in an enterprise network environment.
Deployed on application servers, the DMA
7000 application manages and distributes
video calls in a reliable and scalable
method across multiple Polycom RMX
2000 media servers, which are videoconfer-
encing bridges that allow multiple sites to
join the same meeting, connect users on
different networks, and optimize the call
experience between video endpoints with
different capabilities. Advantages of the
Polycom DMA 7000 include cost-effective
scalability, improved reliability and fault
tolerance, and simplified video network
administration. Polycom DMA 7000 is
planned for general availability in January.
■ Proginet has announced Slingshot Vault,
its new solution to manage the space, securi-
ty, and bandwidth challenges associated
with email attachments. Integrated with
Slingshot Vault is Intradyn's deduplication,
archiving, and e-discovery technology,
which will allow users to send attachments
of any size, archive them, and audit them for
regulatory compliance on-demand. Slingshot
Vault also provides security by encrypting
attachments while in transit to the recipient.
Networking & VPN
■ Astaro released Version 1 .9 of the Astaro
Command Center, its central management
software that allows Astaro customers to
monitor and manage up to 250 Astaro
Gateway appliances from a single point.
Version 1.9 offers improved performance
and greater scalability for larger environ-
ments, and it is based on the same sys-
tem architecture as the Astaro Security
Gateway. The Astaro Command Center's
monitoring functions make it convenient to
centrally manage several customers' securi-
ty installations and permissions. For
instance, you can view hardware compo-
nents, network loads, and running services
of all connected gateway devices from a
central dashboard. Trend indicators help
administrators to predict how important sys-
tem parameters will develop. Yahoo! Maps
is also integrated to provide the precise geo-
graphic location of all managed gateways.
■ Blade Network Technologies and
ipoque, a European traffic management
solution provider, have teamed up to deliv-
er a NEBS -compliant deep packet inspec-
tion and bandwidth management applica-
tion appliance platform. The technology
runs on IBM BladeCenter and is designed
to run in high-traffic environments and
guarantee quality of service for quadruple-
play networks consisting of data, voice,
September 26, 2008
Processor.com
Page 19
Product \^ Releases
multimedia, and video traffic. The applica-
tion appliance platform has Blade's Nortel
10Gb Ethernet Switch Module and is capa-
ble of up to six 10Gb Ethernet links and up
to 60Gb and 4.2 million packets per second.
■ BMC Software has introduced a new
version of BMC Control-M with Workload
Lifecycle Management. The software is
designed to simplify enterprise job schedul-
ing and improve service to the end user
while also reducing costs. BMC Control-M
augments BMC's offerings in the realm of
IT workload automation and business ser-
vice management. Features of BMC
Control-M include the ability for customers
to manage batch processes with more con-
trol and flexibility, version control, change
identification, and virtualization capabili-
ties.
■ Cisco introduced three Cisco MDS 9000
Family 8Gbps Fibre Channel switching
modules and new capabilities in Cisco's
SAN operating system, NX-OS. The Cisco
24-Port 8Gbps Fibre Channel Switching
Module is ideally suited for storage net-
working environments and supports hard-
ware-based separation of Fibre Channel
and FICON traffic. The Cisco 48-Port
SGbps Fibre Channel Switching Module
features 48 auto-sensing l/2/4/8Gbps ports
best for highly virtualized servers in enter-
prise-class data centers. The Cisco 4/44-
Port 8Gbps Ho St- Optimized Fibre Channel
Switching Module offers four 8Gbps ports
and 44 4Gbps ports to consolidate stan-
dard servers with fewer SAN switches.
The new offerings should be available by
Q4 of this year.
■ Cisco and VMware announced a joint
venture to develop data center solutions
that will improve the scalability and opera-
tional control of virtual environments. The
Cisco Nexus lOOOV distributed virtual
software switch, an integrated option in
VMware Infrastructure, features Cisco
Virtual Network Link technology to help
networking administration managers.
Cisco and VMware also teamed up to offer
virtualization consulting services, includ-
ing the Virtualization Assessment Service
and the Planning and Design Service. The
Cisco Nexus lOOOV software switch will
become available in the first half of next
year.
■ Enterasys Networks has introduced
Enterasys SecureStack C3, made for 1Gb
and 10Gb Ethernet access at the network
edge. The Enterasys SecureStack C3
offers enhanced QoS features that auto-
matically discover, classify, and prioritize
voice, video, and data applications. These
applications include IP telephony, HD
videoconferencing, and business intelli-
gence analytics. Availability is provided
by redundant power supplies, and network
devices that need external power are sup-
ported by standards-based IEEE 802. 3af
PoE options. WYSIWYG identity-based
policies are designed to deliver SLA
requirements.
■ GlassHouse Technologies has intro-
duced a suite of Managed Services for
Virtual Environments, which is designed to
produce advanced visibility, monitoring,
and reporting of customers' virtualized IT
environments. An enhanced management
interface provides the services using virtu-
alization management software from
Tek-Tools Software. The suite of Managed
Services for Virtual Environments offers
monitoring and reporting capabilities
that help users get the most from availabil-
ity, track system configurations, and man-
age utilization.
■ HP has introduced new products and ser-
vices that support VMware technologies in
regards to management software, virtual-
ization services, VDI, and server and stor-
age infrastructures. HP Data Protector soft-
ware is designed to centralize automated
data protection and make it easier to recov-
er lost information.
HP also launched HP Data Protector
Zero Downtime Backup and Instant
Recovery that work with HP StorageWorks
Enterprise Virtual Arrays, which are all
available for VMware environments. HP
Insight Dynamics-VSE was also introduced
to increase data center efficiency, along
with HP VEI (Virtual Exchange Infra-
structure) Services designed to maximize
the capabilities of VMware and Microsoft
Exchange 2007.
■ Northwest Performance Software has
announced NetScan Tools Pro 10.70, its
new network discovery and information-
gathering toolkit for network administra-
tors, security specialists, network training
instructors, and law enforcement investiga-
tors. NetScan's new features include
enhanced DNS query tools, which are
designed to help trace the chain of DNS for
both IP addresses and host names. There
are also improvements to email validation,
operating system fingerprinting, packet
generation, traceroute, and port scanning.
NetScan now also runs on Microsoft
Windows 2000/2003/XPmsta.
■ porttracker has announced porttracker
v2.0, a network management appliance
that allows network managers to quickly
track and report on what devices are cur-
rently or have previously been connected
to their network, porttracker' s features
include expanded vendor support, audit his-
tory, and scheduled reporting, porttracker
is available as both a hardware appliance
and a downloadable version and is compat-
ible with a number of switch devices
such as HP Procurve, 3Com, Cisco, and
Extreme Networks.
■ Stampede Technologies announced the
Stampede RCO (Remote Campus Op-
timizer). Designed to optimize efficiency
for application traffic flow between data
centers and remote locations, the new
Stampede RCO will be available to OEM
partners in the fourth quarter. Stampede's
new RCO runs on Linux appliances and
makes WAN access more like LAN access
by facilitating easier, more responsive,
and more efficient remote user application
access. The RCO accelerates most traffic
between a remote branch and a data center
by sitting inline as a transparent bridge.
The RCO runs on a dedicated appliance
with special network hardware that
enables it to go into pass-through if taken
out of service. The RCO accelerates multi-
ple protocols, including HTTP, MAPI,
CIFS, FTP, P0P3, and SMTP. Working in
conjunction with the Stampede Accelera-
tion Series, the new RCO enhances accel-
eration by combining protocol-specific
optimization techniques along with com-
pression technology and Stampede's
Turbo streaming. The RCO makes remote
application use four to 10 times faster and
more efficient, reducing bandwidth usage
by 70 to 90%.
■ Symantec launched the beta release of
Symantec Online Remote Access, which is
an offering that enables users to securely
access files and applications on their com-
puters from any Web-connected PC.
Symantec Online Remote Access is built
around the firm's pcAny where platform
and features a Web-based centralized con-
nection model, real-time remote control.
Go to Page 20
Encryption ^
isn't just for
Secret Agents.
The ABS-Secure Backup System
AES Full Disk Encryption
1
www. cmsproducts. com
800-327-5773
PRODUCTS
From the Makers ofDiskeeper®
Introducing...
Undelete.
withlnvisiTasking- 2009
If you've never had a frantic executive call you in despair about a file they
accidently deleted, pleading with you to recover it from a black hole,
consider yourself lucky. For the rest of us, there's Undelete 2009 with
InvisiTasking technology.
Undelete fills the critical gap in your data protection strategy, ensuring no
data is ever accidently lost— period. Even saved over versions of Microsoft®
Office files are safe. No longer will users cry about having saved over their
spreadsheets. Just a few clicks of the mouse and your files are back. And
with the Desktop Client feature of Undelete, users can recover their files
on their own— so you can get back to the important stuff, like building out
your high-availability mail cluster (or working on your golf swing).
Rapif^Tlmo Pi-otprtinn R/pptLUmo Uanr\%far%f
Try it free at www.undelete.com/udpro
Diskeeper
© 2008 Diskeeper Corporation. All Rights Reserved. Diskeeper, Undelete, InvisiTasking, Real-Time Protection. Real-Time Recovery., and ttie
Diskeeper Corporation logo are trademarks or registered trademarks of Diskeeper Corporation In the United States and/or ottier countries. All
other trademarks or brand names are the property of their respective owners. Diskeeper Corporation • 7590 N. Glenoaks Blvd. Burbank, CA 91504
• 800-829-6468 • www.diskeeper.com
Page 20
Processor.com
September 26, 2008
Product @ Releases
Continued from Page 19
two-way file transfer, remote printing,
detailed alerting and reporting, end-to-end
AES 256-bit encryption, and redundant
data centers. Interested companies can
currently sample the beta release of
Symantec's Online Remote Access at
signup.spn.com/SignUp.aspx.
Physical Infrastructure
■ Cisco added several standards-based
video servers and IP video surveillance
cameras to its Connected Physical Security
system portfolio. New modular Physical
Security Multiservices Platforms are ideal-
ly suited to one or multiple IP-networked
sites. The new enterprise-class SD (stan-
dard definition) indoor and outdoor IP
Fixed Dome Cameras are available in
wired, wireless, indoor, outdoor, box, fixed,
and pan/tilt/zoom formats. Cisco's Video
Surveillance Stream Manager also supports
matrix switch and keyboard input. The
Cisco IP Fixed Dome Cameras will be
available in December.
■ Eaton has developed a line-interactive
UPS targeted toward IT assets such as
switches, routers, servers, VoIP devices, and
workstations, as well as telecommunications
systems, such as EDGE, 3G, and WiMAX
wireless equipment. The Eaton 5130 UPS
comes in 1,250 to 3,000VA models in 2U
and 3U rack and tower form factors. Run
time can be augmented via hot-swappable
batteries and add-on external modules.
■ The third generation of the GigaVUE
2404 high-density data access switch has
been introduced from Gigamon. The
switch is an implementation of Gigamon' s
DAN (Data Access Network) and is
designed for advanced aggregating, repli-
cating, mapping, and packet filtering and
features 24 10Gb Ethernet ports, four 1Gb
Ethernet ports, and a low-profile 2U chas-
sis. Due to the modular design of the
switch, network managers can deploy the
exact number of ports necessary to accom-
plish specific IT goals.
■ National Instruments launched its
Lab VIEW SDI-12 Application Program-
ming Interface software, which lets NI
Lab VIEW graphical system design plat-
form users manage environmental monitor-
ing sensors. The Lab VIEW SDL12 API is
ideally suited to the environmental mea-
surements in research, engineering, and sci-
ence applications in a laboratory setting or
remote installation. Interested users can
download the Lab VIEW SDI-12 API free
from the NI Instrument Driver Network at
www.ni.com/idnet.
■ Staco Energy Products released its
UniStar P series single-phase online UPS
in tower designs. This true online double-
conversion UPS is available in 6kVA,
8kVA, and lOkVA models to prevent out-
ages and irregularities in incoming line
voltages from 160 to 280VA at 45 to
65Hz. Up to four UniStar P modules can
be installed in parallel for redundancy or
additional capacity. Each UniStar P fea-
tures high overload handling without trans-
fer to the bypass, along with protection
against short circuit and over-temperature
conditions. The Smart Battery Man-
agement System continuously monitors
battery status and recharges whenever nec-
essary. Hot-swappable battery packs allow
users to change batteries without shutting
down the UPS. Standard software is
compatible with Windows 98/Me/NT/
2000/XP.
Security
■ Aladdin Knowledge Systems announced
Aladdin eToken PKI Client 5.0, software
that provides an enhanced framework for
creating a secure method of exchanging
information based on public key cryptogra-
phy. eToken PKI Client 5.0 for Windows
will be followed shortly by versions for
Linux and Mac later this year. Features of
version 5.0 include an enhanced Password
Complexity Module that allows the user to
determine password complexity, improved
management capabilities, and ease-of-use
updates. eToken PKI Client 5.0 allows
administrators to configure two permis-
sions sets — one for administrators and
another for nonadministrative users.
Permission for each item of the PKI
Client's properties can be tagged separately
for different levels of users. Users can also
now delete stored data objects, such as cer-
tificates or SSO profiles, without entirely
initializing the token.
■ Catbird announced version 2.0 of V-
Security, software that provides protection
for VMware. V-Security is a noninvasive
SO A for virtual and physical networks that
offers cross-platform coverage, including
Rogue VM Quarantine Network Access
Control; Sprawl Management and Control,
Intrusion Prevention, and Intrusion
Detection; Policy Compliance and En-
forcement; Vulnerability Monitoring; and
Auditing Compliance. Unlike conventional
host-based and proprietary hardware solu-
tions. Catbird's stateless architecture is
fully SO A- and cloud-based, 100% plug
and play. Web-enabled, and designed to
have minimal impact on the virtual envi-
ronment. Version 2.0 includes TrustZones,
which are logical groupings of VMs that
share a predefined common set of policy
and compliance rules. There's also a
Catbird Control Center that provides a
management console for V-Security 2.0.
■ McAfee has delivered a secure virtualiza-
tion solution, McAfee Total Protection for
Virtualization. The solution extends securi-
ty across virtual and physical environ-
ments. Optimized for the VMware plat-
form, McAfee Total Protection for
Virtualization delivers layered protection
for all virtual machines, a single manage-
ment console, automatic updates, and
automated compliance reports. McAfee
Total Protection for Virtualization includes
the following core components: McAfee
VirusScan Enterprise and McAfee Virus-
Scan Enterprise for Linux, McAfee Vi-
rusScan Enterprise for Offline Virtual
Images, McAfee An ti- spy ware Enterprise,
McAfee Host Intrusion Prevention for
Server, and McAfee ePolicy Orchestrator.
Total Protection for Virtualization will be
available in the fourth quarter.
■ Symantec introduced the latest versions
of its data and system protection offerings
for Virtual Machines and Windows Server
2008 Environments. Backup Exec 12.5,
Backup Exec System Recovery 8.5, and
Backup Exec Infrastructure Manager 12.5
all feature better storage flexibility for het-
erogeneous environments. The new releases
also support Windows Small Business
Server 2008, Windows Essential Business
Go to Page 21
COMPAa
Get the MAX from your VAX!
Get the MAXimum from your existing VAX investment through Compaq's continued commitment to the
VAX range of computing products.
As you are no doubt aware, Compaq has announced the end of production of the VAX platform.
COMMITMENT
Compaq recognizes that for many of our customers there will be extensive and long-term support
requirements for their investments in VAX. Because we value all of our customers, in North America,
IGS Systems, Inc., will continue to fulfill your VAX equipment needs. The option to buy quality-reman-
ufactured products is designed to protect your initial IT investment; by ensuring the availability of
Compaq branded equipment long after the manufacturing cycle has ended. Compaq will continue to
service VAX at least until the year 2010 and will continue to enhance Open VMS for VAX indefinitely.
VAX PRODUCTS
We recommend that you contact this reseller for your used equipment needs.
IGS Systems, Inc.
Telephone/Fax:
Tel: 508-866-1171
Fax: 508-866-4500
Toil-Free:
1-888-DECPART
(1-888-332-7278)
For further information on obtaining VAX systems:
Visit: http://www.decparts.com
September 26, 2008
Processor.com
Page 21
Product @ Releases
Continued from Page 20
Server 2008, and SQL Server 2008. Backup
Exec 12.5 and Backup Exec System
Recovery 8.5 will be available next month
starting at $995 per media server license
and $1,095 per server license. The Backup
Exec Infrastructure Manager 12.5 will be
available later this year starting at $1,995.
■ Keep your data center secure and in com-
pliance with Tripwire Enterprise v7.5 from
Tripwire. The product gives you central
control over internal and external policies,
even in a virtualized and heterogeneous
environment. Tripwire Enterprise v7.5's
change auditing facilitates the management
of unauthorized virtual machine sprawl.
Meanwhile, broad support of virtual objects
helps admins quickly assay the configura-
tion integrity of just about everything on
the system.
■ Data center admins can rest easier know-
ing that the WatchGuard XTM 1050 is
on the job. XTM stands for extensible
threat management, WatchGuard says, and
with twin quad-core Intel CPUs and
encryption acceleration in hardware, the
WatchGuard XTM 1050 seems ready to
live up to its name. It's capable of 2Gbps
IPSec and lOGbps firewall throughput, the
company says.
■ Websense is set to introduce a unified and
effective Web and data security offering,
Websense Web Security Gateway. Based
on Websense Web Security Version 7,
Websense Web Security Gateway is de-
signed to help enterprises embrace and use
Web 2.0 technologies. Further, Websense
Data Security Endpoint, a data loss preven-
tion tool that helps companies prevent data
loss through hard-to-control devices such as
USB drives, will also be available.
Servers
■ AEP Networks introduced the AEP
Netilla SSL VPN Virtual Edition, a
prepackaged software-only virtual appli-
ance that streamlines secure remote appli-
cation access installations on virtual server
offerings, such as VMware ESX. Netilla
VE enables enterprise customers and ser-
vice providers to quickly spin up remote
access projects on-demand within an exist-
ing virtualized server infrastructure without
requiring new appliance hardware. The
software also lets IT security managers take
advantage of streamlined hardware mainte-
nance processes, lower data center power
consumption, and improved business conti-
nuity benefits inherent in server virtualiza-
tion deployments. Netilla VE offers load
balancing/failover that IT staff can turn up
at will with the Netilla Load Balancer
option. The software can also scan to
assure that client devices maintain corpo-
rate-standard antivirus, firewall, and other
requirements prior to access.
■ Attachmate released Attachmate
Verastream Host Integrator 6.6, the latest
version of its mainframe application inte-
gration tool. Version 6.6 includes features
and functionality that reduce the technical
complexity and code generation associated
with legacy integration to offer IT organi-
zations a low-risk approach for legacy-to-
SOA integration. The Verastream Host
Integrator 6.6 software modernizes main-
frame functionality to help alleviate many
of the challenges associated with legacy
integration. Whether the process is within
Web, mobile, or contact center application
solution environments, the Verastream
Host Integrator can simplify the process.
The flexible, scalable approach to SOA
integration quickly and noninvasively ser-
vice-enables all types of mainframe and
enterprise host functionality.
■ Axios announced RefWiz, an analysis
and documentation tool that provides
comprehensive information about applica-
tion element interrelationships for main-
frame batch and online applications.
RefWiz improves upon traditional manual
analysis by providing details that help
reduce analysis time and increase the
accuracy of the analysis. RefWiz gathers
information from JCL, source code, and
database definitions to build application
inventories that capture the interrelation-
ships between different elements, such as
jobs, procedures, control card members,
programs, data sets, and databases.
Additional information is collected from
the system for both batch and online exe-
cution history to further enrich the data.
RefWiz also collects data from SMF
records, scheduling, and change manage-
ment tools to integrate it into the reposito-
ry and provide access to accumulated
change and usage histories.
■ Citrix XenServer 5, the latest in a line of
server virtualization products, has been
introduced by Citrix Systems. The product
is designed to better its previous iterations
with new management capabilities and ease
of use, ideally making data centers more
dynamic for users. Features include an
enhanced open architecture; support for vir-
tually every storage environment including
Fibre Channel and iSCSI NAS, DAS, and
SAN; and support for AMD and Intel 32-
and 64-bit systems.
■ Radware announced an optimization
solution for the virtualized environment,
VirtualDirector, as part of Radware' s
Business-Smart Data Center strategy. The
core of Radware' s Business-Smart Data
Center strategy is providing its customers
with tailor-made application infrastructure
solutions for next-generation data centers to
help them overcome IT complexities and
ensure cost-effective procurement and full
investment protection. VirtualDirector pro-
vides adaptive and dynamic allocation of
resources based on business events, which
can help to guarantee SLAs (service level
agreements) and improve response time of
applications. VirtualDirector aligns data
center operations with business policies by
dynamically allocating resources on
demand to serve customers' best needs for
SLAs in a virtualized environment. In addi-
tion, to save costs, VirtualDirector opti-
mizes the use of data center resources to
generate energy and cooling savings. Key
advantages obtained from deploying
Radware' s VirtualDirector in a hybrid or
fully virtualized environment include
improved QoE (quality of experience),
dynamic allocation of resources in real
time, alignment of network behavior, accu-
rate estimates and control of VM deploy-
ment, and reduced risk.
■ Sun released its Sun xVM Server soft-
ware and Sun xVM Ops Center 2.0, two
offerings in its stable of desktop and
data center virtualization products. Sun
xVM Server software is an open source
data center-grade server virtualization
Go to Page 22
.C(M
Same Great
Information
NEW LOOK
Our new, easier-to-read
home page allows you to
quickly find the information
you need.
Page 22
Processor.com
September 26, 2008
Product @ Releases
Continued from Page 21
product that lets users virtualize and man-
age heterogeneous workloads from Win-
dows, Linux, and Solaris operating systems
on Sun x86 platforms and SPARC-based
servers. The Sun xVM Ops Center 2.0
delivers simplified management of virtual
and physical environments with the added
benefit of virtual guest management. Sun is
also offering Virtualization Workshop,
Virtualization Architecture, and Virtuali-
zation Implementation services, as well as
tailored needs assessments. Sun xVM
Server software is priced starting at $500
per year per physical server. Sun xVM
Infrastructure Enterprise Subscription starts
at $2,000 per physical server per year. Sun
xVM Infrastructure Datacenter Subscrip-
tion starts at $3,000 per server per year.
The latest release of Sun xVM Ops Center
is available for $100 per managed server up
to $350 a year.
Sun also announced two Intel Xeon-
based servers, the Sun Fire X4450 server
and Sun Blade X6450 server module. Each
offering is built around Intel's Xeon
processor 7400 series, with up to six pro-
cessing cores. The Sun Blade X6450,
designed for virtualization and server con-
solidation, HPC, database, and enterprise
applications, delivers up to 11 teraflops of
peak performance per fully populated Sun
Blade 6048 chassis and 24 memory DIMM
slots. The Sun Fire X4450 server is a four-
socket x64 2U server best suited to consoli-
dating workloads. The server consumes
33% less watts per core than the previous-
generation processors and can be enclosed
in half the form factor of comparable
servers. Supported operating systems
include Solaris, Linux, Windows, and
VMware. The Sun Fire X4450 server and
Sun Blade X6450 server module will be
available next month starting at $8,545 and
$9,455, respectively.
■ The Tidal Enterprise Scheduler Adapter
for VMware is the latest offering from
Tidal Software. It enables Tidal Enterprise
Scheduler version 5.3 and later to extend its
central scheduling control to virtual
machines. Among other things, it allows
admins to schedule configuration, power,
and system state snapshot actions within
the ESX hypervisor, which aids in the
automation of what is still a manual task in
many data centers.
■ Unisys has announced the release of soft-
ware for the Unisys Infrastructure Manage-
ment Suite. Additionally, Unisys has made
available the ES7000 Model 7600R
Enterprise Server for Xeon six-core proces-
sors. The Unisys Business Assurance
Services include the following: Unisys
Disaster Recovery Architecture Service,
Unisys Backup Modernization Service, and
Unisys Data Protection for Backup Service.
uProvision software allows users to enforce
compliance and set up software distribution.
Unisys' disaster recovery solution automates
workflows and detects failure conditions.
The ES700 Model 7600R supports up to 96
processor cores on 16 sockets; it ranges in
price from $26,430 to $135,000.
Storage
■ Coraid announced the availability of the
EtherDrive LD2461 Storage Appliance, a
high-performance RAID storage appliance
that attaches to an AoE (ATA over
Ethernet) SAN using 10Gb Ethernet. The
EtherDrive LD2461 Storage Appliance is
uniquely suited for virtualization with high
lOP loads where maximum spindle count
and minimum rack space are critical.
Utilizing Coraid' s newly introduced AoE
driver for VMware' s ESX hypervisor,
EtherDrive LD2461 supports 24 2. 5 -inch
SATA disks in a 2U rackmount chassis.
The new EtherDrive LD2461 was intro-
duced to meet the specific requirements for
server virtualization. These applications
require high lOPs and high throughput, and
the LD2461 delivers performance of more
than 500MBps.
■ FalconStor Software announced NSS
(Network Storage Server) Virtual Appli-
ance for VMware ESX, designed to enable
customers to transform existing direct-
attached storage into an iSCSI virtual SAN
appliance for VMware environments.
Features of the FalconStor NSS include
storage virtualization, provisioning, man-
agement, and data protection. Other fea-
tures include application-aware snapshot
and replication technology and support for
Microsoft SQL Server, Exchange Server
and SharePoint Server, Oracle Database,
Lotus Notes, Sybase Database Manage-
ment, IBM DB2, and more.
■ Isilon has announced the release of its
fifth-generation clustered storage systems.
With the release of its OneFS 5.0 operating
system software, Isilon' s X-Series clustered
storage systems set the standard for scale-
out file storage, delivering up to 20GBps
and 2.3PB of capacity in a single file sys-
tem and single volume. The release of the
new fifth-generation clustered storage sys-
tems includes improved performance, scal-
ability, and ROI.
■ New from iStor Networks are 1Gb and
10Gb Ethernet iSCSI storage products with
the integraSuite/MC Management Center.
The latter maximizes the benefits of a virtu-
alized environment by allowing IT admins
to abstract logical storage from its physical
counterpart, the company says.
■ MicroNet has announced RAIDBank4,
its storage solution for SMEs. RAIDBank4
includes MicroNet' s 2-port eSATA PCI
Express host bus adapter card and NTI
Shadow backup software and is available
with a 4-port option. RAIDBank4 features
a 300MBps data transfer rate and a foot-
print of only 6.5 x 4.75 inches. RAID-
Bank4 is available in 2 or 4TB configura-
tions.
■ PlateSpin Forge 2.0 is the latest disaster
recovery appliance from its namesake. The
hardware features embedded VMware for
virtualization purposes. Boasting instanta-
neous failover protection as well as fail-
back that's independent of the hardware,
PlateSpin Forge 2.0 offers multiple recov-
ery points and expedited recovery to a
remote location over a WAN.
■ Western Digital announced that it has
leveraged 250GB -per-platter technology to
make its WD Scorpio Blue 2. 5 -inch note-
book hard drives available in capacities up to
500GB. The series of drives are available in
400GB and 500GB capacities. The drives are
designed to deliver 3Gbps transfer rates with
extremely quiet and cool performance.
Proprietary features of the drives include
WhisperDrive to keep the drives as quiet and
possible; ShockGuard, which prevents dam-
age to the platters; and IntelliSeek, which
calculates seek speeds to run at lower power.
lUServer- ASAMOli
1 CPU, Intel Quad Core Xeon 5310, 1.6GHz 8MB
1GB (2X512MB) 667MHz FBDIMM Installed,
IX 80GB SATA II 7200 RPM Installed, Max - 4TB,
IX 4 Port SATA II RAID Controller Installed-
lU rackmount Chassis, 560Watt PS.
4 Drive bay, Rails Included.
Price Starting at: $1265/-
2U Server- ASA2 12 li
1 CPU, Intel Quad Core Xeon 5310, 1.6GHz 8MB
1GB (2X512MB) 667MHz FBDIMM [nstalled,
6TB (12X 500GB) SATA II Installed, Max - 1 2TB.
IX 12 Port SATA II RAID Controller Installed.
2U Rackmount Chassis, SOOWatt Redundant PS.
12 Drive bay. Rails Included.
Price Starting at: $4275/-
3U Server- ASA3 16 li
1 CPU, Intel Quad Core Xeon 5310, 1.6GHz 8MB
1GB (2X512MB) 667MHz FBDIMM Installed,
8TB (16X 500GB) SATA II Installed, Max - 16TB.
IX 16 Port SATA II RAID Controller Installed.
3U Rackmount Chassis, BOOWatt Redundant PS.
16 Drive bay. Rails Included.
Price Starting at: $4995/-
T
m
:::::;itlll
5U Server- ASA5241i
1 CPU, Intel Quad Core Xeon 5310, 1.6GHz 8MB
1GB (2X512MB) 667MHz FBDIMM Installed,
12TB (24X 500GB) SATA II Installed, Max - 24TB.
IX 24 Port SATA II RAID Controller Installed.
5U Rackmount Chassis, 9 30 Watt Redundant PS.
24 Drive bay, Rails Included.
Price Starting at: $7345/-
8U Server- ASA8421i
1 CPU, Intel Quad Core Xeon 5310, 1.6GHz 8MB
1GB (2X512MB) 667MHz FBDIMM Installed,
2X 80GB SATA II 7200 RPM OS drives Installed
20TB (40X 500GB) SATA II Installed, Max - 40TB.
2X 12 Port & IX 16 Port RAID Controller Installed.
8U Rackmount Chassis, 1300Watt Redundant PS.
42 Drive bay. Rails Included.
Price Starting at: $12735/-
ASA730 1 &ASA7302-X2U-ST2
Blade Server
7U rack-optimized enclosure, holds 10 blades
3+1 redundant 4200W or 6000W or 7500W
Price Starting at: $4050/-
For more details please call
ASA COMPUTERS, INC.
2354 Calle Del Mundo,
Santa Clara, CA 950S4.
www.asacomputers.Gom
Phone - (408)-654-2901
Fax - (408)-654-2910
Eval Servers Available on request
Since 1989, ASA has served customers like Cisco, Juniper, Caltech, Fermilab and most
Universities. We provide total custom server solution with OS of your choice. Excellent
pre-sales and post-sales support. Reliable hardware at most competitive prices. Please
call or contact us for your next hardware purchase.
1-800-REAL-PCS
Efficient.
Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and other countries.
Price and availability subject to change without notice. Not responsible for typographical errors. All brand names and logos are trademarks of their respective companies.
September 26, 2008
Processor.com
Page 23
Stretching Data Center Dollars
Extend The Life Of Your Data Center
& Save Money
by Curt Harler
• • •
Nobody has been promised a fat, care-
free budget for the rest of 2008. That means
data center managers must look for ways
they can extend the life cycle of their cur-
rent data centers and make more "room" in
them without adding any more real estate
or physical space.
One way to save money is to operate
more efficiently and effectively. Another
way to save dollars is actually to move
computing off site to a service provider's
location. Both strategies have proven suc-
cessful.
"Most companies are not in a position to
build new facilities, and many cannot relo-
cate their data center," says Liam McGlynn,
senior analyst with Enterprise Management
Associates (www.enterprisemanagement
.com). "But there are a number of approaches
Checklist
For Money Savings
Look into virtualization.
Look at data center organization.
Look at the physical setup of the data center.
Look at software services: Can someone
else do it?
Look at power configurations.
Look into federation of databases.
a data center manager can take that will
extend the life of the data center."
A data center automation specialist with
25 years experience, McGlynn' s approach-
es involve getting more out of existing
equipment, saving money by using less
power, and more intense management. In
the real world, companies are doing just
that. "Software tools allow you to maxi-
mize use of data center resources, floor
space, and power," he explains.
"The first thing a data center manager
should look in to is virtualization," McGlynn
says. Because most servers are typically
utilized at only 5 to 10% of capacity, virtual-
ization allows the data center to get more
utilization.
"You can often get 10-1 virtualization, . . .
and that means you will consume less power
and generate less BTUs (for cooling)."
The latter is increasingly important in
many parts of the country where utilities
are limiting or capping the amount of
power a data center can get from the grid. It
also saves money and resources.
Going Offsite
An offsite provider can be another alter-
native to even the most efficient in-house
computing solutions. Levine Financial
Group (www.levinefinancialgroup.com), a
Toronto-based firm, provides insurance and
wealth management services to medical
and business professionals. In business
since 1967, the company handles a great
deal of sensitive information. Data integrity
and client confidentiality are of paramount
importance. There is no room for short-
cuts — but little room for expanding bud-
gets, either.
To ensure compliance, Levine Financial
Group needed to easily back up data from
its application servers. After implement-
ing an online backup service, the compa-
ny was able to centrally back up its data
and quickly recover lost files to any com-
puter at any time without compromising
security. The offsite vendor shoulders all
of the responsibility for protecting the
company's data and business-critical
applications, and Levine Financial Group
has no ongoing investment in additional
equipment or real estate while achieving
its computing goal of having regularly
scheduled system backups to a remote
location.
"We had tape backup and mirrored drives
onsite," says Elliott Levine, director at the
company, "but we looked at offsite storage
as a good final solution."
Not only does the service protect the
company's data, but it doesn't impose any
additional demands on personnel. "There
is nothing for our staff to do. All of the
backup is handled offsite," Levine con-
tinues. Levine Financial Group has
been using the offsite service for almost
two years.
"There is nothing I would change," he
says. "We got the backup we wanted.
We've had to restore a couple of times.
They understand it is a stressful situation
and got us back where we needed to be."
Levine was able to retain control over a
vital process while offloading the burden of
management and space onto someone else.
Know What You Have
Because saving money is of little value if
it comes at the cost of losing control over
computing assets, another step to consider
Go to Page 24
Learn From
Tlie Big Boys
Face it, mainframe computers are the bench-
mark for processing enormous, heteroge-
neous workloads at near maximum CPU uti-
lization. Ideally, virtualized server banks
would approach that capability. In reality,
they do not.
"This is because mainframes assign priority
by processor, memory, I/O," explains Liam
McGlynn, senior analyst with Enterprise
Management Associates (www.enterprise
management.com).
Server hardware itself cannot accomplish
this, but there are solutions on distributed
platforms that allow IT to establish priority
uses for applications. Managers fight for
priority access. This is why every department
wants its own server — an expensive and
inefficient route to take.
"Some applications are not ideal candidates
for virtualization," McGlynn notes. An applica-
tion that does a lot of I/O is a good example
of a weak candidate. However, there are
solutions that run under a single OS and
allow IT to establish priorities. These tools
increase the efficiency of server processing.
Security
August 8, 2008
No-Hassle
Password Management
Cloakware's Server Password Manager v3.5 Offers
Upgraded Deployment & Integration Features
Privileged and A2A (application-to-appli-
cation) password management is a powerful
way to maintain security for any company,
yet many enterprises eschew this protection
because of its prohibitive cost. Cloakware
offers a more cost-effective solution to this
issue with the release of CSPM (Cloakware
Server Password Manager) version 3.5.
CSPM is a Shared Account Password
Management platform designed to support
data centers of various types, including mul-
tisite, heterogeneous, and high-volume cen-
ters. CSPM is designed to offer ensured
high availability in distributed networks and
improved integration with homogeneous
data centers, all without disrupting the sys-
tem or causing downtime.
CSPM utilizes streamlined deployment
options, improved integration into existing
environments, scalability, and availability to
help companies improve compliance, pro-
tect confidential data, decrease system
downtime, and reduce operational costs.
CSPM allows regular password changes
and password policies to be applied to serv-
er-based accounts. It eliminates hard-coded
passwords by removing the need to share
passwords with developers, so the problem
of needing to create a new password doesn't
require redeployment of applications.
Other features of CSPM include reliabili-
ty across multiple sites and plug-and-play
application server support. Deployment
options enable one CSPM deployment to
act as a primary core with support for multi-
ple remote data centers.
Cloakware Server Password
Manager v3.5
Server password manager with high availability,
easy integration, and broad deployment options
(703) 752-4830
www.cloakware.com
cloakware
datacenter solutions
Storage
September 5, 2008
Centralized Control
B&L's Vertices Tape Management Software
Puts Control All In One Place
The handling of your company's media is
not something to be taken lightly. Vertices,
a comprehensive tape management software
solution from B&L Associates, collaborates
with your backup system and gives you
absolute control over your company's
media, all with one simple application.
With Vertices, users can monitor the
usage and movement of media at all their
company's storage sites, onsite and off.
The Media Management System
Having this kind of control translates to a
rapid response to information requests
such as audits. Users can also use Vertices
to log mainframe media from their CA-1
or RMM systems. In addition. Vertices
will automatically import tape information
from legacy tape management systems or
backup applications and quickly verify
tape movements via barcode scanning.
Vertices is compliant with government
regulations such as HIP A A and Sarbanes-
Oxley. It tracks, locates, and protects data
with recovery capabilities, as well as cre-
ates an audit trail so that companies can
easily provide reports when necessary.
And accidental deletion of information is
no worry with Vertices' purge and recov-
ery system, and its two-tiered security sys-
tem allows for role-based profiles so that
people only see information relating to
their security level.
Vertices distinguishes itself with its flex-
ible composition that can adapt to different
operating environments. Users can expand
Vertices' capabilities by choosing optional
modules that better suit their company's
setting. Vertices Automation Module inte-
grates with several popular backup applica-
tions. Other modules are available, as well,
such as the RFID Module and the Foreign
Media Module.
B&L Associates Vertices
Starts at $10,900 for Vertices Small Business Edition
Comprehensive tape management solution that gives
users control over their
company's media at all
storage sites
(781)444-1404
www.bandl.com
B&L ASSOCIATEr
Page 24
Processor.com
Are SMEs
Avoiding Vista?
The Ins & Outs
Of Delaying Vista Deployment
by Robyn Wei smart
Many analysts thought that the reason
Vista had yet to take off was because most
IT departments were waiting for SPl to
banish any bugs or security weaknesses
typical in the first iteration of any new
operating system. Moreover, Microsoft's
decision to stop selling new versions of
Windows XP was expected to jump start
the migration to its newer OS.
Instead, Vista increasingly is looking
DOA, says Rob Meinhardt, CEO of sys-
tems management solution provider KACE
(www.kace.com). Recently, King Research
updated a study on Vista adoption on
behalf of KACE and discovered that 60%
of those surveyed have no plans to deploy
Vista. And 92% say that Vista SPl has not
changed their plans for Vista deployment.
The Reluctance To Upgrade
For his part, Paul Troyer, Web and sys-
tems administrator at worker's compensation
software provider Tropics Software Tech-
nologies (www.gotropics.com), lists several
reasons for his company's reluctance to
upgrade. First off, Troyer' s company does
not want its operating system dictating its
hardware upgrade cycle. "We believe there
will be a learning curve and productivity loss
when we roll out Vista, and we're too busy
currently to deal with training," he says.
Moreover, some of the company's back-
end software isn't compatible with Vista,
which translates into expensive upgrades or
investing time and energy sussing out an
alternative solution. "We see no real advan-
tage or 'must have' features in Vista," says
Troyer. "Microsoft stripped out most of the
main features [Vista] was supposed to have
so it could ship."
What about Vista's vaunted security
improvements? Says Troyer: "We agree [with
Microsoft] that it is more secure, but in our
environment with Active Directory, hardware
firewall, and antivirus [applications], we are
reasonably comfortable with XP."
Wait & See
Roger Kay, founder and president of
technology market analysis firm Endpoint
Technologies (www.ndpta.com), concurs
parts, keep inventory, print out invoices, and
keep customer lists. "He's used the same sys-
tem for 20 years, and every so often a white
box guy comes around and tunes up every-
thing. The service contract is maybe $100 a
year." Kay says this is an extreme example,
but nonetheless, it further illustrates Troyer' s
notion that a business should dictate upgrade
cycles rather than the other way around.
Granted, Windows 7, due out in 2009 or
2010, does build on Vista and will most like-
ly prove to be a bigger leap from WinXP
than Vista, Kay points out. "But the ratio-
nale may be, 'It's going to cost me more
money to make this conversion, so why not
The increasing use of Web-based
applications and virtualization is mal(ing
operating systems increasingly irrelevant.
with Troyer that for many organizations.
Vista offers minimal, if any, benefits and
that WinXP is more stable for the time
being.
"The level of disruption is high," says
Kay. "Vista's model is very different from
XP, and you may need new hardware — not
just PCs but other devices like printers."
Moreover, Vista requires new applications,
including homegrown programming.
Software and drivers need to be modified to
play nice with Vista, and it' s a crapshoot as
to which partners make changes to make
this a reality, Kay explains.
"Microsoft warns, 'You'll lose your
competitive edge,' but IT people are cyni-
cal," Kay says. "They're thinking, 'Micro-
soft doesn't understand my business. I'm
not doing fantastic applications. I don't
need my client to be so capable.'"
Kay then cites that his mechanic uses
Microsoft DOS on a 486 machine to access
ancient programs that enable him to find
hold on to XP for now and squeeze more life
from my existing stuff?'" Kay says.
Bypassing Vista
Recently, KACE CEO Meinhardt wrote a
blog entry titled "Businesses Like XP No
Matter How Bad Microsoft Says It Is"
September 26, 2008
(rmeinhardt.typepad.com). It features a
spoof screenshot of a devil crouched over
text that reads "Microsoft XP, Evil Edition"
over a black screen.
Despite Microsoft's recent marketing
campaigns extolling Vista's virtues. Vista
lacks anything compelling to cause IT
managers to switch, Meinhardt says.
"Historically, there was always something
compelling going to the new operating sys-
tem — it was more stable or faster or some-
thing. Vista may have a flashier user inter-
face, but there's nothing that makes people
say, 'Wow, I gotta have that,'" he says.
Meanwhile, the increasing use of Web-
based applications and virtualization is mak-
ing operating systems increasingly irrelevant.
SaaS applications look pretty much the same
whether you use WinXP, Vista, Mac, or
Ubuntu. Meanwhile, Google has put together
a set of business tools (Gmail, Google Docs,
and Google Calendar) that allows businesses
to bypass Microsoft entirely.
At the same time, Endpoint' s Kay says
that switching to alternative desktop operat-
ing systems does not make sense for many
businesses. Red Hat recently withdrew sup-
port for its desktop Linux OS, and there
isn't another Linux-based desktop OS that
is a first-class business OS, says Kay. And
while Kay calls Apple's Mac OS X a won-
derful operating system, Apple as a compa-
ny does not behave in a manner appropriate
for businesses.
Finally, Kay thinks that Microsoft will
slowly taper off support of WinXP. "There
is scrambling in Redmond to make sure
that XP support overlaps right up to
[Windows] 7's release," he says. "At this
point, the Windows 7 guys are being seen
as white knights." ui
Notable Numbers From The King Research Study
According to King Research, 1 ,162 IT profession-
als responded to its June 2008 online survey, an
update to its original November 2007 study on
KACE's behalf. More than 99% of respondents
used Windows in their network deployments.
Here is a sampling of the statistics:
• 60% of respondents say they do not intend to
deploy Vista.
• 92% of respondents say Vista SP1 has not
changed their Vista deployment plans.
83% of respondents say that Vista's ability to
play well with their companies' necessary
business applications concerns them.
14% of respondents plan to skip Vista alto-
gether in favor of Windows 7, while another
1 4% report they have delayed Vista deploy-
ments to learn more about Windows 7.
42% of respondents are contemplating deploy-
ing non-Windows operating systems to avoid a
Vista migration, with 29% saying that Mac OS X
is their top choice.
Stretching Data
Continued from Page 23
is to use software that helps IT manage-
ment know and understand what is under
the data center umbrella. This includes both
local and remote assets.
A company should have a configuration
management database, which is a repository
of all of the hardware and software compo-
Center Dollars
nents in the system, McGlynn says. There is
a way to make that economical, too.
"These need to be federated," McGlynn
says. Federation of databases is joining of
pockets, maintaining information from a
variety of sources in one database. "You
don't need to keep data in two places. If
you do, one or both will get out of sync."
Configuration management software has
other capabilities. It will allow management
to deal with capacity issues by optimizing
placement of servers in the data center.
"Know which ones are your hot racks and
which are your cool racks," McGlynn con-
tinues. It sounds obvious, but it is a com-
monly ignored factor. "Where do production
servers go?" he asks. The answer, of course,
is "at the bottom" because production
servers generate a lot of heat, and heat rises.
"If you place servers intelligently, you
will maximize both space and power,"
McGlynn says.
Another dollar saver is balancing power
use in the data center. "Beware putting all of
your big power consumers on one side of the
data center," he adds. Mapping the data cen-
ter allows IT to understand its heat patterns.
Every time there is a new service request,
consult the process automation software to
allow optimization of cooling and power. □
Services
August 8, 2008
Get Cash For Your Data Tapes
Recycling Your Media Has Never Been So Safe, Sound & Simple
Data tapes we recycle: SDLT, 9940, 3590, LTO, AME AIT, and many others.
Most enterprise data centers are ap-
prehensive about recycling data tapes due to
security. Recycle Your Media is one of the
largest and most respected full-service data
tape recycling companies worldwide.
RecycleYourMedia.com is the most
viable solution for your end-of-life data
tapes. Recycling your media is environ-
mentally sound and economically sensible,
given that it can recoup IT costs.
When recycling your data
tapes, you need to be assured
that the data will be destroyed
and rendered unreadable. We
practice the most secure meth-
ods, complying with govern-
mental privacy and storage
laws. We are highly experi-
enced in data eradication and will offer
data destruction certificates and volume
serial reports to ensure your sensitive data
is irretrievable.
Matthew Bernard, IT network manager
at John Wiley & Sons, says, "Although
hesitant to release my used data tapes, I
found Recycle Your Media's data tape
recycling service to be secure, profession-
al, and more than I expected."
Recycle Your Media works with Fortune
500 firms, banks, government agencies, law
firms, and hospitals, making us a reliable
source for all data tape recycling needs.
Why pay for tape shredding? Recycle
Your Media can pay you to recycle your
data tapes. Recycling data tapes is simple:
Give us a call and we take care of the rest.
Recycle Your Media
We buy all types of tapes and recycle them using
secure and environmentally sound methods
(877) 798-2737
www.recycleyourmedia.com
IB^ecv cleYourMedia
WM^^^^^^m^^^^m S ECURE END OF LIFE DATA SOLUTIONS
September 26, 2008
Processor.com
High Density
Means Hieh Coolins
Avoid Overloading
Your Cooling System
by Drew Robb
The latest hardware has certainly made
it much easier to pack a lot more horsepow-
er in a smaller package. Blades, of course,
have shrunk the form factor of the average
server, and quad-core chips make it possi-
ble to quadruple the amount of juice in the
same footprint.
"Blades are the fastest-growing segment
in the server market," says John Enck, an
analyst at Gartner.
Now factor in virtualization. By setting
up 10 virtual machines in a single blade,
you are going to be taking up every possi-
ble unit of processing power — the only
problem is that you are going to be generat-
ing a whole lot more heat.
"The adoption of high-density servers
has been somewhat of a forced migration,"
says Kenneth Wolverton, vice president of
data center operations at CyrusOne (www
.cyrusone.com). "Like the evolution from
cassette tapes to CDs, manufacturers are
simply not offering or supporting legacy
technology."
Analyst firm IDC has noted that approxi-
mately 75% of SMEs are in the process of
implementing high-density computing plat-
forms. By 2012, that number will approach
100%. Unfortunately, this effectively ren-
ders the existing power and cooling infra-
structure obsolete.
According to CyrusOne, traditional data
centers operate at approximately 100 watts
Raised Floor Or Not?
When it comes to coping with the densities of
tomorrow, SMEs are advised to abandon any
and all preconceptions. Best practice texts
from only two years ago, for instance, stress
not to have more than 2kW per rack. Throw
that one out of the window right now.
Similarly, the time-honored under-floor plenum
concept may be under threat.
"A raised floor goes against the laws of
physics as cold air falls and hot air rises," says
Missy Young, executive vice president of
sales engineering at Switch (www.switch
nap.com).
per square foot. A high-density infrastruc-
ture, on the other hand, requires an average
of 250 watts per foot. For example, high-
density blade servers operate at 50 amps, a
major increase over previous
server generations that typical-
ly ran at 20 amps. As a general
rule of thumb, it takes $1 (of
utility power) to cool every
dollar in direct consumption in
a high-density data center.
"To temporarily alleviate
cooling challenges, users are
inefficiently spreading out their
high-density systems across
rows of their data centers,"
says Wolverton. "This mini-
mizes the usages of white floor
space and requires the installa-
tion of additional computer
room AC (CRAC) units." He
offers some recommendations
to avoid overheating in highly
dense spaces:
Architecture. The subfloor
ventilation and perforated tiles
should be designed and laid
out using engineering-driven
schematics that maximize output and avail-
ability for any emergency overheating situ-
ation. Ventilation in a high-density envi-
ronment requires a minimum 3 -foot raised
floor to accommodate necessary subfloor
equipment. Racks should be set up in a hot
aisle/cold aisle configuration with dual air-
flow designed to effectively disperse cold
air into the cold rows and to pull hot air off
the hot aisles, minimizing the mix of cold
and hot air.
Tools. High-density data centers should
take advantage of a CFD (computational
fluid dynamics) simulation
to engage the entire layout
of the data center and run
through all the "what if"
scenarios to identify hot
spots and potential problem
areas. CFD simulations
can also be used to identify
the strategic placement of
CRAC units to ensure that
optimal airflow can be
diverted and/or increased to
any potential hot zones.
"SMEs should make capital
investments in existing
infrastructure to upgrade
their data center to accom-
modate high-density, i.e.
additional CRAC units, rearchitecture of
aisles, and using tools like CFD," says
Wolverton. "Alternatively, they can select a
high-density colocation that guarantees
Cold air is brought in above the racks and allowed to fall down in front of the servers.
Hot air is completely contained and channeled above the ceiling at the SuperNap
facility in Las Vegas.
availability, scalability, and increased watts
per square foot."
Winning The Battle
Phil Francisco, vice president of product
management and marketing at Netezza
(www.netezza.com), says that in the com-
ing years, SMEs will battle to bring power
consumption under control.
"Industry analysts predict that soon, 50%
of data centers won't be able to cool off,"
says Francisco. "According to IDC, by
2009, technology operations in the U.S.
Page 25
will spend twice as much for power and
cooling as they did to buy the server hard-
ware in their data centers."
He feels the solution lies in specially
architected racks and appliances tailored
to specific purposes, such as data ware-
housing, storage, and supercomputing.
These customized solutions are being
designed with much greater energy effi-
ciency, lower power consumption, and a
smaller footprint.
Alternatively, some SMEs may find that
it is simply more efficient to implement
blades and virtualization in a colocation
facility. Some of these organizations have
the resources to implement
state-of-the-art cooling and
power architectures that most
SMEs can only dream of.
Shoe retailer Zappos.com,
for example, uses colocation
to host its IT services. As a
result, it can pack blades as
densely as it wants into a
small space. It began with four
racks and built the IT side of a
$700 million success story
around that hosted hardware.
It has expanded now to a large
cage of hardware at the colo-
cation facility.
But it makes a difference
which colocation facility you
choose. One company, for
example, wanted to deploy 38
racks packed with blades and
pizza box servers and asked
various colocation facilities for
an estimate of costs. One pro-
vider has the cooling and power infrastruc-
ture to support all those racks in 720 square
feet. Others with less efficient cooling
setups estimated up to 16,000 square feet of
rented space with each rack spread around
with a minimum of 20 cubic feet of air cir-
culation. You can guess which vendor
quote would be the highest.
So check just how much power your
potential colocation facility can accom-
modate. In the paragraph above, the
quotes ranged from 17kW per rack to
IkW per rack.
A dual air plenum architecture, in conjunction with a hot aisle/cool aisle configuration, is used
in high-density data centers to accommodate increased watts per square foot requirements.
How Do You Research & Make Your Buying Decisions?
The proven track record of Processor's print issue and Web site offer an unbeatable combination!
When you're looking for product or buying information, turn to the print issue for a wide variety
of current products from our list of hand-selected manufacturers and resellers.
Once you're ready to buy, turn to our Web site to connect with companies offering the products
and services you need.
For More Information Call: (800) 247-4880
International Calls: (402) 479-2141
Or Contact Us On The Web: www.processor.com
Page 26
Processor.com
September 26, 2008
I SIX QUICK TIPS I
Securing Mobile Data
Employee Education & Security Measures
Are Key To Protecting Data On The Move
by Carmi Levy
As INCREASINGLY POWERFUL handheld de-
vices and higher-capacity wireless networks
enable users to get more work done from
wherever they are, security concerns contin-
ue to dog IT. Keeping confidential client and
organizational data is challenging enough on
conventional desktop computers. But when
employees can carry it out the door at the
end of the day, it opens up entirely new
forms of vulnerability.
If you're concerned about keeping your
mobile data from falling into the wrong
hands, consider the following tips as part of
your overall mobile data security strategy.
Educate Your Mobile Users
Although mobile- specific security tech-
nologies are rapidly becoming more capable,
affordable, and ubiquitous, no technology
can protect the organization unless its em-
ployees are properly trained and rewarded.
Jack Gold, president and principal ana-
lyst of J. Gold Associates, says companies
can't afford to ignore the human factor.
"No matter what kind of technology you
use, human behavior is always going to get
in the way," he says. "If you look at the
history of security breaches, most have
been because some human made a mistake.
So if you get your people trained and on
your side, it really helps you reduce the risk
because the human element is always the
hardest to fine-tune."
Gold recommends investing in upfront
and ongoing training for everyone and
making sure process-specific documenta-
tion is easily available. Compliance falls
off when employees don't know how it
works or can't get the help they need.
Draft acceptable-use policies and enlist
HR for universal sign-off. Tie compliance
to performance management processes.
Solicit input from users when drafting new
policies, which Gold says maximizes buy-in
and ensures these procedures will be well-
received. It also ensures a realistic balance
between company and end-user needs.
Encrypt & Authenticate
Although a top-level password can slow
mobile users down a bit, it represents a vital
means of protecting these easily lost or stolen
devices. Activate password protection on all
newly delivered devices and ensure users
don't turn it off afterward. Set a timeout to
automatically lock inactive devices and
implement remote kill and wipe in case they
disappear. Mobile security features should be
installed in such a way as to prevent end
users from disabling them. Remove mobile
privileges from users who refuse to comply.
As with conventional desktop and laptop
computers, install security software to pro-
tect against viruses, Trojans, and other
BONUS TIPS
■ Properly define your
devices. Many organizations
focus their attention solely on
laptops, mobile phones, and
smartphones. They should
expand their scope, as data
can easily reside on a wide
range of mobile devices, in-
cluding USB drives, media
players such as iPods, mem-
ory cards, and even in-car
entertainment/navigation
systems.
Make sure your acceptable-
use policies specifically refer
to the full range of mobile de-
vices that can potentially be
used within your organization.
Update the documentation
regularly to reflect new tech-
nologies and allow only those
devices or media that support
encryption and other forms
of protection.
■ Don't be afraid to punish.
Accountability is critical if
employees are expected to
consistently follow secure
mobile data management
practices. Jack Gold, presi-
dent and principal analyst
of J. Gold Associates, says
companies must document
expected organizational re-
sponses to security breach-
es. These can range from a
simple slap on the wrist to
termination.
"Your data is important. And if
you screw up, there are penal-
ties, as there should be," says
Gold. "Sometimes it's very
innocent and people weren't
doing anything intentional. But
companies should still have
policies in place so they can
understand why it happened
and who's responsible.
"Sadly, it's a bit like dealing
with your kids," he adds. "If
they're naughty, sometimes
you have to send them to their
room for a while."
forms of malware. Update your firewalls to
protect mobile devices, as well.
Select only platforms that offer end-to-end
data encryption. Gartner analyst John Girard
recommends using strong algorithms and
FIPS 140-2-certified products. Although
encryption often bogs down older hardware,
newer infrastructure handles it without a
noticeable impact on performance.
Leave Your Data In The Office
Wireless access to corporate resources
should, in theory, reduce the need to carry
around large amounts of data on your
mobile device. Girard says not taking it
with you can actually improve work quality.
"If I am trying to make up-to-date deci-
sions, I need up-to-date data, and it's going
to be fresher if it stays in a database on my
server," he says. "Online applications solve
"No matter what kind
of technology you
use, human behavior
is always going to
get in the way."
- Jack Gold, president and principal analyst
of J. Gold Associates
a lot of integrity problems and dramatically
reduce data exposure."
Similarly, Girard advises laptop users to
avoid caching local data if the job is natural-
ly done online. Old data and its supporting
applications are also risky. Once mobile
users no longer need them, ensure they have
the tools they need to remove them for good.
Close The Gaps
The best mobile security plans can be
compromised by easily missed device set-
tings. For example, encrypted files may
become unencrypted when copied to an
external drive or memory card. As more and
more smartphones support high-capacity
cards, the data may be completely exposed
if the device is not properly configured.
Some misbehaving applications interfere
with the device's timeout feature. As the
timeout is a critical element of device securi-
ty, software that quietly keeps the device
from timing out represents a serious source
of vulnerability. Take the time to deliberately
find — and eliminate — these gaps.
Best Risk Avoidance:
Just Sync It
The only thing worse than losing a device
loaded with data is losing a device loaded
with data that wasn't backed up or synchro-
nized. Before any device is deployed, ensure
any data stored on the device is automatically
synced to a secure corporate resource. Man-
date regular sync activities even for the most
far-flung road warriors.
As much as possible, automate the process
to reduce the risk of user-driven errors. Reg-
ularly analyze backed-up data to ensure it is
valid. As with conventional data backup, you
don't want to learn your backups have been
saving gibberish the morning after your CEO
reports that his BlackBerry was stolen during
a business trip.
If a regularly synced device is lost or stolen,
business continuity is maintained by simply
deploying a replacement unit and restoring
the data. Meanwhile, even if the device was
stolen by a thief bent on compromising your
organizational data, these efforts will be sty-
mied by full encryption and password pro-
tection.
Best Return On Investment:
Automate Compliance
Having acceptable-use policies on the books
won't benefit the organization unless every-
one consistently plays by the same rules. Un-
fortunately, manual tracking of compliance is
labor-intensive and expensive.
Help desks often lack the bandwidth to handle
the additional mobile monitoring and enforce-
ment workload. Adding staff is an inefficient
solution. To address this, the organization
must take as much responsibility for compli-
ance out of the hands of the end user as pos-
sible. People make mistakes, which can ripple
throughout the organization.
To address this, leverage automated mobile
management tools— often built into mobile
server infrastructure and freely available to
IT administrators— to ensure mobile devices
are provisioned, configured, maintained, and
used in a proper policy-friendly manner. Re-
mote system diagnostics and software dis-
tribution, password reset self-serve, and
scheduled system audits can reduce support
infrastructure overhead and still ensure every-
one is using the devices as intended. This
also minimizes the potential for data loss or
breach in the event that a device falls into the
wrong hands.
Thanks to DMD, we
don't have to sit on
our old computer
equipment anymore.
When it comes to IT equipment
liquidation or disposal, we are
serious. Let us worry about data
security and destruction, EPA
regulations, transportation, down
time and insurance. Don't tie up
your resources or take chances with
your data or environmental issues.
Call DMD today!
(877) 777-0651
We Purchase:
Computers/Laptops
Networking Equipment
Power/Environmental
Te I econn/ Network
Complete Data Centers
Printers
We Offer:
Asset Tracking/Reporting
Deinstallation/Packing/Transport
DOD Level Data/Mechanical Destruction
EPA Recycling/Reuse
Ongoing Support Plans
Technology Refresh/Install Programs
Find out wliy some of tlie top U.S. companies and Government
Agencies call DMD Systems Recovery.
NAID
DIVID SYSTEMS RECOVERY, INC.
A Slightly Different Company"^'^
Toll Free: (877) 777-0651 Phone: (602) 307-0180 Fax: (602) 307-0181
Internet; www.dnndsystems.com
Providing QUALITY GOODS and SERVICES for Industry.
Member of AFCOM, Better Business Bureau, Chamber of Commerce. HP Authorized. Member of NAID (National Associati
BBB
for Information Destructioi
GPS
GLOBAL
PRINTER
SERVICES
INCORPORATED
HP U 4250N
$595
HP U 5035XS
$2395
HP LJ 4300
$395
The ^
Resellers
Resource
All printers include parts
and labor warranty. This
is only a small sample
of what we have in
stock. Please call for
price and availability
for other models,
accessories and parts. -
Over 150 different HP LaserJet printer models in stock!
Buy your HP laser printers from the industry leader. WTren you purchase
a printer from GPS you are buying the best refurbished printers available.
We offer a one year warranty on printers and free technical support for
the life of the printer. We can provide you with a specific model you are
looking for or one of our experienced staff can help you select the printer
that will best meet your needs. Your satisfaction is our number one ^^^^^
priority, so if you are not completely satisfied with your purchase you cart\^
return your printer for a full ^nd. V
/ Resellers Welcome.
Source for Printers
800-588-3554 • 608-268-4300
www.globalprinfter.com • Free Tech Support
September 26, 2008
Processor.com
Page 27
WHAT'S Happening
Repackaging Risk Management
CMS Products Works Toward Better
Enterprise Backup, Recovery & Security
by Daniel Sweeney
• • •
Miniature high-capacity hard disks,
sometimes called thumb drives, comprise a
thriving category in the mobile enterprise.
So much so that industry pioneers may find
themselves facing lots of agile insurgents.
CMS Products, located in Costa Mesa,
Calif., is one such pioneer, with more than
25 years of experience in data backup and
disaster recovery. Beginning as a distribu-
tor for purveyors of large enterprise storage
solutions, CMS (800/327-5773; www.cms
products.com) focuses on product develop-
ment, marketing, and distribution.
Storage Niche
CMS claims a special niche in the
portable storage space, which has thus
far provided the firm with strong, consis-
tent growth.
"We don't lack for competitors," admits
Gary Streuter, vice president of marketing
for CMS Products. "So what makes us stand
out aside from our higher prices? We're the
spare tire of disaster recovery," he says.
CMS works to develop hard drives and
programs for data backup and recovery,
encryption, and security, which are areas,
as Streuter points out, that don't lack for
rivals. Both Streuter' s spare tire analogy
and the reference to disaster recovery are
indicative of how CMS attempts to position
itself against those rivals.
As Streuter sees it, most external disk
drive vendors market their products as
appliances or computer accessories. CMS,
on the other hand, wants to be seen as a
comprehensive solution provider, of which
the company's proprietary Windows-based
software is a vital part.
The chief selling point of BounceBack
and Ultimate BounceBack, two of the com-
pany's solutions for data recovery, is that
they reconstruct the computing environ-
ment in full by restoring all applications
and settings as well as simply files (the
company has trademarked this particular
function, called QuickRestore).
"Just like the spare tire," Streuter says.
"You exchange with the flat, and you're
back on the road."
CMS distinguishes its offering from prod-
ucts that mirror or image the workstation
and don't provide the full functionality of
the machine being imaged. As an example,
Streuter says, "I visited my dry cleaner
recently, and his hard drive had just crashed.
All of his billing and customer information
was on that drive. If he'd had BounceBack,
he would have been up and running again in
a few minutes. It's not just saving your data;
it's continuing to serve your customer base
with almost no interruption."
BounceBack also enables the user to
operate the host computer from the external
drive via a USB port. "Think of it as a fail-
safe; a life support system," says Streuter.
"The idea is to remedy the situation that
caused the crash as quickly as possible, not
to continue to operate off the external
drive. That's why it's like a spare tire."
BounceBack even has provisions for pro-
viding such remedies within its software
suite. Features within the suite perform
diagnostics on the internal hard disk and
attempt restoration and reconstruction.
Unique Offerings
Wolfgang Schlichting, an analyst with
IDC specializing in storage and data
recovery software, feels the BounceBack
offering is unique. "There are lots of
hardware manufacturers competing with
CMS in the external hard drive space
and a number of software vendors selling
products with somewhat similar function-
ality to BounceBack, but no one's provid-
ing the total package. It's the synergy that
is unusual. The QuickRestore functionali-
ty that lets you operate the laptop from
the external drive is especially powerful.
I don't know of anything else that will
do that."
Like most of the competition, CMS'
ABS Rugged, Plus, and Secure external
drives for both notebooks and desktops are
extremely compact. But what distinguishes
these drives from the competition is their
flexibility and versatility.
CMS's redundant backup product, dubbed
the Velocity2, incorporates BounceBack
Enterprise Server software that can be pro-
grammed to back up files and applications
at intervals ranging from one minute to
one hour.
CMS also offers a line of security prod-
ucts, including CE Secure Vault Edition,
for encryption using the AES-256 algo-
rithm; the Vault OTG, an encrypted flash
drive; and ABS Secure, an external USB
encrypted disk product. CMS' encryption
software operates almost invisibly in the
background on both the laptop and exter-
nal backup drive. Biometric authentica-
tion is standard, ensuring that if units
are stolen, sensitive information will re-
main inaccessible.
Value Add
CMS sees its software as a considerable
value add, which contributes to the relative-
ly high retail price of the BounceBack sys-
tem. "We're not giving it away like our
competitors," says Streuter.
For enterprises, the loss of data, whether
it' s on a laptop or other device, can create a
disaster and potential liability. That's why
CMS goes beyond simply selling boxes and
works toward providing overall disaster
recovery and risk management packages
for enterprise customers, especially mo-
bile professionals.
As for the future, according to Streuter,
the company will continue to develop
and improve its enterprise offerings but
will also promote the BounceBack
bundle within the consumer market-
place, offering it as a solution for preserv-
ing multimedia files.
"We're the spare tire of disaster recovery."
-CMS Products' Gary Streuter
THREE QUESTIONS
The Power To See All
Endace Offers Products To Monitor, Capture,
Inspect & Report On Your Network's Data
by Brian Koerner
Endace provides network monitoring, latency
measurement, and application solutions to cap-
ture, inspect, and report on all of an organiza-
tion's data flowing over its network. The compa-
ny, founded in 2001 and headquartered in Auck-
land, New Zealand, has about 100 employees
with offices in the U.S., Asia, and Europe.
According to Chris Komatas, the director of
product management and operations, Endace
(www.endace.com) has many blue chip corpo-
rations, financial institutions, and government
agencies that rely on its products. Komatas
explains that because of the unique approach
and hardware-based technology that Endace
brings to the marketplace, Endace clients are
able to guarantee network security, integrity,
and performance for their users and applica-
tions, regardless of transmission speed, load-
ing, or interface type.
■ What are the biggest IT-related
issues facing today's small to
midsized enterprise?
"Existing network monitoring has been de-
ployed using vertically integrated products
with a single probe per application, or with
network switches/routers used to collect net-
work monitoring data, generally reducing
their performance," Komatas says. "This
approach to network monitoring drives high-
er cost of equipment both in cap-ex and op-
ex and most will not scale to monitor at
10Gb network speed." Organizations are
now faced with trying to decrease the cost
and complexity associated with having so
many products and applications analyzing
data. "Endace can help them standardize
their approach and reduce costs and com-
plexity," he says.
■ What should Processor reaAers know
about your company's products?
Endace offers a variety of products, including
network monitoring interface cards and Ninja
appliances and platforms. The Endace DAG
network monitoring interface cards provide
100% packet capture and hardware-based pre-
cision time-stamping, traffic filtering, data stream
replication, and CPU load-balancing functions.
According to Komatas, "The Endace DAG
interface technology complements the Intel
multicore strategy, optimizing processing capa-
bilities to provide significant acceleration for
data-intense network analysis applications."
The Endace Ninja appliances provide a hard-
ware-optimized system that takes advantage
of the wire-speed capabilities of the Endace
DAG technologies and can quickly be installed
and deployed with a variety of features and
functionality, secure remote management, and
configuration backup capabilities.
"NinjaProbe is the first multifunction probe de-
signed to be monitoring-application-agnostic but
directly deliver important data and analysis tools
for operations," Komatas says. "The NinjaProbe
can be widely deployed across an entire net-
work infrastructure to provide monitoring and
reporting and to feed multiple central monitoring
applications at 10 [Gigabit Ethernet] speeds."
"The NinjaProbe captures 100% of data with
nanosecond packet time-stamping and high-
speed capture allowing IDS, forensics, and
traffic analysis. This approach replaces multi-
ple separate probes. The NinjaProbe is in-
creasingly being deployed in financial net-
works where latency and monitoring are worth
millions of dollars but equally applies in other
industry segments," Komatas says.
Endace's NinjaBox platforms provide a scal-
able open platform on which an organization
can migrate existing network traffic analysis
applications to meet the demands of analyz-
ing traffic at up to lOGbps. The platform pro-
vides intelligent management of captured
network data so existing software applica-
tions and configurations can be accelerated
with minimal changes.
■ What makes your company unique?
"Endace is unique in developing the un-
derlying monitoring card hardware for the
NinjaProbes," he says. "This unique tech-
nology enables 100% packet capture with
nanosecond packet time-stamping available
across all high-speed interfaces. Our solu-
tions range through to a unique 40Gbps
monitoring solution." Komatas says that
Endace also is focused on understanding
its clients' business problems and aligning
solutions to meet client needs.
Page 28
Processor.com
September 26, 2008
InBus Has Intel
Boards & Systems!
InBus Engineering
Has the World's Largest Inventory
of Hard-to-Find
Intel Boards and Systems
6Pj;000 Square Fqp^^^^
XYIi9.5?J^?!l?.s.oCJj?A^lPFO^upA'^.^
J[nM5?EMPC_Deskt^^^
Same Day Deli very
.\V.^?r.?P.t^.QjlAlL?F<i^.ypts.and
We Purchase Excess Inventory
Call (925) 454 -2546
InBus
ENGINEERING
www.inbus.com
6233 Industrial Way, Livermore, CA 94550, Tel (925) 454-2500 Fax (925) 454-2501
to say,
VECMAR
Computtr Solutions
www.vecmarcom
J (^TallyGenicom WYSE OKI
^Boundless aBQIS 0?m^c!^
• Wyse and HP Thin Clients
• Wyse, Link, ADDS, and
Digital/Boundless Dumb Terminals
• OKI Impact Printers
• TallyGenicom and Printronix
Line Printers
• Label Printers
• Digital Check and Panini
Check Scanners
GolSreen with
, _ remanufactured
email: sales@vecmar.coiin equipment!
Computer Connection
I of Central New York, Inc.
www.ccny.com ^
For all your IT Network & Security Needs
BUYS / SELLS / TRADE-IN / SERVICE / NEW / USED
yMs, C^,^^ Cisco Systems
wSun coMPAa mmm
^'-^°^y^^^^^ MilllliiillllMI.
f==;5:=RrinET- Array Networks BLUE-ARC
800-566-4786
purchasing@ccny.com
sales@ccny.com
$$ CASH $$
$$ CASH $$
media recovery
Datacenter products and services
WANTED!
Magnetic Tape Media:
9940 • 9840 • 3590 • LTO • SDLT
Please Contact
Al Bass
214-630-9625
abassignani @ mediarecovery.com
Visit our new web site at: www.mediarecovery.com
$$ CASH $$
$$ CASH $$
dbg
DEC-Compaq-Cisco-Sun-SGI
770-931-7732
Fax 770-931-9416
www. dbgweb . com
salesp@dbgweb.com
AlphaServer GS160 Model 16
Base System for OpenVMS
• DY-160CG-AA
• One Alpha 21264 Processor 1224 MHz
• Four Quad Building Blocks
• One 14-Slot PCI Shelf
• OpenVMS Operating System License
ALSO AVAILABLE:
• Additional 1224 MHz CPU w/SMP
• Additional Memory
• Additional PCI Shelves
• Additional PCI Options
2 Systems In Stock!
Authorized COMPMX Reseller
WE WILL BUY YOUR USED HARDWARE!
iQff E.L.I.
I Call for a Quote Today! {
Quick Shipping
In-house Technical Staff
International Shipping
Phone 800-447-1156
617-547-4005
Fax 617-354-1417
E-mail sales@eli.com
SUN MICROSYSTEMS
Sun Fire
Sun Blade
StorEdge
3310/3510 Array
Spares
CPUs
Drives
Memory
Entry/Midrange Servers
288 Norfolk Street
Cambridge, MA 021 39
For our complete
online catalog
go to www*elLcom
DEC/HP
Alpha
DecServers
Comm. Gear
VAX
Memory/Disks
CISCO
Routers
Catalyst Series Switches
Network Modules
Pix Firewalls
Port Adapters
VPN+ Security Product
SYSTEMS CORPORATION
Sen/ing the ITIndustty for 20 Years
(800) 426.5499 TOLL FREE
(508) 230.3700 LOCAL
(508) 238.8250 FAX
info@compurex.com
www.compurex.com
WANT
TO BUY
• HP • COMPAQ • DEC
• OFF- LEASE
• SURPLUS/EXCESS
• END OF LIFE ^ J
SELL • LEASE • RENT • REPAI
Do
QinHl Information
H m Technology
I MM I Trading
m — We Buy, Sell and Lease IBM
®— AS/400 • RS/6000 • Servers
(S) — System Upgrades
® — Advanced 36 Systems
Tape Subsystems
Printers, Terminals, Modems
O — 21 Years Experience
Ph: (877) 715-3686 ggj
Fx: (405) 715-3682 SSl
WWW. itechtrading. com
We Also Buy
All Other
Brands of
Computer
Hardware!
Attention data Center/ IT Managers
Where do you go to find the
newest products available?
Check out each week's issue for . . .
' Marketplace ads filled with in-depth
information on new products.
' Quick rundowns of all new data center-related
products released in the past week.
' Articles with valuable productoverviews and data.
. . . then go to Processor.com and take
advantage of our online search tools to find
even more in-depth information!
PR(X]ESSOR
"/Q^^^^t^ C^Pt^t^te^ ^]^l/U^/^^i^iti^v^f
(800) 856-21 11
www.pegasuscomputernet
5pec/aJfziffig /n POS /Bare ode mofketi'ng and hajidwar&ma/nfenartce.
Over the past 20 years Pegasus Computer
Marketing has evolved from a marketing
company for mainframe terminals to providing
both sales, maintenance, and flat rate repair for
POS, barcode hardware of all makes and models,
wireless and networking peripherals, laser print-
ers, and flat panels just to name a few. PCM
currently carries several large contracts with
major retailers from POS units to handheld
scanners, vehicle computers to access points
and related peripherals. PCM can tailor flexible
contracts to cover any client requirements. To
ensure the quality of our products and services
we offer only depot maintenance.
Customer tailored secure Web-entry for RMA
requests and instant RMA numbers.
References available upon request.
Poinf of Sole
Handheld ^canneti
Vehicle a
Handheld
Compute
Soles/Servi
Depot Ma
PRINTRONin
QMS
New & Refugfished
PRIMTCRS
SPARE PARTS • EpHANGES • SUPPLIES
TW-AX/CO-AX • IGP™
QMS^ Magnum®
Dat^^^iance
CorilBIBBftji
www.datareliance.com
Ph: 574-935-9550 Fx: 5^935-9555
_ WE BUY TAPE!
DLT-LTO-AIT-AME-DDS-QIC-3480-3590-9840-Etc.
New & Used - All Types of Data Tape Media
Certified DATA DESTRUCTION Assured
World's #1 Tape Buyer is The Data Media Source
l-iighest values paid - Free pick-up at your site
1-800-252-9268 www.datamediasource.com
We Buy Used
Cell Phones
^r^%for each
^^11 phone!
&pay
u p to
Some pliones have no value. See current purchase prke
list for individual model prices at www.pacebutl*r.rarn
www.pacebutler.com
1-800-248-5360 -(405) 755-3131
reOGESSCK
iyterib© Today!
©iillCi@@])i1li=i(0)M
Sut)scrlt>e Online!
Go to www.Processor.com